Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
Typedeb
Namespacedebian
Nameopenjdk-17
Version17.0.19~9ea-2
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-11vj-5zz4-6fe7
vulnerability_id VCID-11vj-5zz4-6fe7
summary openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30698
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69565
published_at 2026-04-02T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.6967
published_at 2026-04-18T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-12T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69621
published_at 2026-04-13T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69661
published_at 2026-04-16T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69581
published_at 2026-04-04T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.6956
published_at 2026-04-07T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69611
published_at 2026-04-08T12:55:00Z
8
value 0.00605
scoring_system epss
scoring_elements 0.69627
published_at 2026-04-09T12:55:00Z
9
value 0.00605
scoring_system epss
scoring_elements 0.6965
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359693
reference_id 2359693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359693
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:13:36Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://access.redhat.com/errata/RHSA-2025:8063
reference_id RHSA-2025:8063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8063
25
reference_url https://access.redhat.com/errata/RHSA-2025:8431
reference_id RHSA-2025:8431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8431
26
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
27
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
28
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
29
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
30
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
31
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
32
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-30698
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11vj-5zz4-6fe7
1
url VCID-13t7-vubq-8kae
vulnerability_id VCID-13t7-vubq-8kae
summary openjdk: Enhance certificate handling (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53057
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22702
published_at 2026-04-02T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22599
published_at 2026-04-18T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22642
published_at 2026-04-12T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22587
published_at 2026-04-13T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22602
published_at 2026-04-16T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22747
published_at 2026-04-04T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22535
published_at 2026-04-07T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22612
published_at 2026-04-08T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22666
published_at 2026-04-09T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22683
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53057
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
reference_id 1118944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403082
reference_id 2403082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403082
6
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T14:46:38Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:18814
reference_id RHSA-2025:18814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18814
8
reference_url https://access.redhat.com/errata/RHSA-2025:18815
reference_id RHSA-2025:18815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18815
9
reference_url https://access.redhat.com/errata/RHSA-2025:18816
reference_id RHSA-2025:18816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18816
10
reference_url https://access.redhat.com/errata/RHSA-2025:18817
reference_id RHSA-2025:18817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18817
11
reference_url https://access.redhat.com/errata/RHSA-2025:18818
reference_id RHSA-2025:18818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18818
12
reference_url https://access.redhat.com/errata/RHSA-2025:18819
reference_id RHSA-2025:18819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18819
13
reference_url https://access.redhat.com/errata/RHSA-2025:18820
reference_id RHSA-2025:18820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18820
14
reference_url https://access.redhat.com/errata/RHSA-2025:18821
reference_id RHSA-2025:18821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18821
15
reference_url https://access.redhat.com/errata/RHSA-2025:18822
reference_id RHSA-2025:18822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18822
16
reference_url https://access.redhat.com/errata/RHSA-2025:18823
reference_id RHSA-2025:18823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18823
17
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
18
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
19
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
20
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
21
reference_url https://access.redhat.com/errata/RHSA-2025:22370
reference_id RHSA-2025:22370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22370
22
reference_url https://access.redhat.com/errata/RHSA-2025:22672
reference_id RHSA-2025:22672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22672
23
reference_url https://usn.ubuntu.com/7881-1/
reference_id USN-7881-1
reference_type
scores
url https://usn.ubuntu.com/7881-1/
24
reference_url https://usn.ubuntu.com/7882-1/
reference_id USN-7882-1
reference_type
scores
url https://usn.ubuntu.com/7882-1/
25
reference_url https://usn.ubuntu.com/7883-1/
reference_id USN-7883-1
reference_type
scores
url https://usn.ubuntu.com/7883-1/
26
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
27
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
28
reference_url https://usn.ubuntu.com/7900-1/
reference_id USN-7900-1
reference_type
scores
url https://usn.ubuntu.com/7900-1/
29
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
30
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-53057
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13t7-vubq-8kae
2
url VCID-1buj-5nv9-bbcd
vulnerability_id VCID-1buj-5nv9-bbcd
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22044.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22044
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.34387
published_at 2026-04-02T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.34316
published_at 2026-04-18T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34282
published_at 2026-04-07T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34325
published_at 2026-04-08T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34355
published_at 2026-04-09T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.34357
published_at 2026-04-11T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.34317
published_at 2026-04-12T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34294
published_at 2026-04-13T12:55:00Z
8
value 0.00141
scoring_system epss
scoring_elements 0.34329
published_at 2026-04-16T12:55:00Z
9
value 0.00141
scoring_system epss
scoring_elements 0.34415
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22044
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22044
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221642
reference_id 2221642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221642
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:00Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://www.debian.org/security/2023/dsa-5458
reference_id dsa-5458
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:00Z/
url https://www.debian.org/security/2023/dsa-5458
7
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
8
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
9
reference_url https://security.netapp.com/advisory/ntap-20230725-0006/
reference_id ntap-20230725-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:00Z/
url https://security.netapp.com/advisory/ntap-20230725-0006/
10
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
11
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
12
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
13
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
14
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
15
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
16
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
17
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
18
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1~deb12u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-22044
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1buj-5nv9-bbcd
3
url VCID-1d6t-ndfc-m7hg
vulnerability_id VCID-1d6t-ndfc-m7hg
summary OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21443
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18033
published_at 2026-04-18T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18326
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18029
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18111
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18168
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18174
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18126
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18078
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.1802
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075793
reference_id 2075793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075793
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21443
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d6t-ndfc-m7hg
4
url VCID-2tju-1r8k-sbf9
vulnerability_id VCID-2tju-1r8k-sbf9
summary OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61803
published_at 2026-04-18T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.61701
published_at 2026-04-07T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.6175
published_at 2026-04-08T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61766
published_at 2026-04-09T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.61787
published_at 2026-04-11T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61775
published_at 2026-04-12T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61756
published_at 2026-04-13T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61798
published_at 2026-04-16T12:55:00Z
8
value 0.00417
scoring_system epss
scoring_elements 0.617
published_at 2026-04-02T12:55:00Z
9
value 0.00417
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
reference_id 2275005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
25
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
26
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
27
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
28
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
29
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
30
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
31
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
32
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
33
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
34
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
35
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
36
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
37
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
38
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
39
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
40
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
41
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
42
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
43
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21094
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tju-1r8k-sbf9
5
url VCID-3aae-859j-1bg9
vulnerability_id VCID-3aae-859j-1bg9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21293
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26644
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26688
published_at 2026-04-04T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26473
published_at 2026-04-07T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26541
published_at 2026-04-08T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.2659
published_at 2026-04-09T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26596
published_at 2026-04-11T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26551
published_at 2026-04-12T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26494
published_at 2026-04-13T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.265
published_at 2026-04-16T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26472
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041417
reference_id 2041417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041417
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21293
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aae-859j-1bg9
6
url VCID-3hj5-z3ck-tkha
vulnerability_id VCID-3hj5-z3ck-tkha
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21365
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29608
published_at 2026-04-18T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-16T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041785
reference_id 2041785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041785
19
reference_url https://www.debian.org/security/2022/dsa-5057
reference_id dsa-5057
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://www.debian.org/security/2022/dsa-5057
20
reference_url https://www.debian.org/security/2022/dsa-5058
reference_id dsa-5058
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://www.debian.org/security/2022/dsa-5058
21
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://security.gentoo.org/glsa/202209-05
22
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
23
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
25
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
26
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
27
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
28
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
29
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
30
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
31
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
32
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
33
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
34
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
35
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
36
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
37
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
38
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
39
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
40
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
41
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
42
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
43
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
44
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21365
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hj5-z3ck-tkha
7
url VCID-3tav-ffar-hfhb
vulnerability_id VCID-3tav-ffar-hfhb
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-02T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30573
published_at 2026-04-18T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30653
published_at 2026-04-09T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30658
published_at 2026-04-11T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30613
published_at 2026-04-12T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30566
published_at 2026-04-13T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30591
published_at 2026-04-16T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.3075
published_at 2026-04-04T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30561
published_at 2026-04-07T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30619
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
reference_id 2160475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0203
reference_id RHSA-2023:0203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0203
27
reference_url https://access.redhat.com/errata/RHSA-2023:0204
reference_id RHSA-2023:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0204
28
reference_url https://access.redhat.com/errata/RHSA-2023:0205
reference_id RHSA-2023:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0205
29
reference_url https://access.redhat.com/errata/RHSA-2023:0206
reference_id RHSA-2023:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0206
30
reference_url https://access.redhat.com/errata/RHSA-2023:0207
reference_id RHSA-2023:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0207
31
reference_url https://access.redhat.com/errata/RHSA-2023:0208
reference_id RHSA-2023:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0208
32
reference_url https://access.redhat.com/errata/RHSA-2023:0209
reference_id RHSA-2023:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0209
33
reference_url https://access.redhat.com/errata/RHSA-2023:0210
reference_id RHSA-2023:0210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0210
34
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
35
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
36
reference_url https://access.redhat.com/errata/RHSA-2023:0354
reference_id RHSA-2023:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0354
37
reference_url https://access.redhat.com/errata/RHSA-2023:0387
reference_id RHSA-2023:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0387
38
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
39
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
40
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
41
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
42
reference_url https://usn.ubuntu.com/5898-1/
reference_id USN-5898-1
reference_type
scores
url https://usn.ubuntu.com/5898-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21843
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tav-ffar-hfhb
8
url VCID-44t4-tppq-ybb3
vulnerability_id VCID-44t4-tppq-ybb3
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21549
reference_id
reference_type
scores
0
value 0.00227
scoring_system epss
scoring_elements 0.45479
published_at 2026-04-02T12:55:00Z
1
value 0.00227
scoring_system epss
scoring_elements 0.45501
published_at 2026-04-09T12:55:00Z
2
value 0.00227
scoring_system epss
scoring_elements 0.45446
published_at 2026-04-07T12:55:00Z
3
value 0.00227
scoring_system epss
scoring_elements 0.455
published_at 2026-04-08T12:55:00Z
4
value 0.00227
scoring_system epss
scoring_elements 0.45521
published_at 2026-04-11T12:55:00Z
5
value 0.00227
scoring_system epss
scoring_elements 0.45491
published_at 2026-04-12T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.45496
published_at 2026-04-13T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.45544
published_at 2026-04-16T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.4554
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21549
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108547
reference_id 2108547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108547
8
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
9
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
10
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
11
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
12
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.4%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.4%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.4%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.4%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.4%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.4%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21549
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44t4-tppq-ybb3
9
url VCID-47ae-xdqr-6qgb
vulnerability_id VCID-47ae-xdqr-6qgb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21540
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.6268
published_at 2026-04-02T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62713
published_at 2026-04-04T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62677
published_at 2026-04-07T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.62728
published_at 2026-04-13T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62745
published_at 2026-04-09T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62763
published_at 2026-04-11T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62752
published_at 2026-04-12T12:55:00Z
7
value 0.00433
scoring_system epss
scoring_elements 0.62769
published_at 2026-04-16T12:55:00Z
8
value 0.00433
scoring_system epss
scoring_elements 0.62777
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21540
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108540
reference_id 2108540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108540
8
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
9
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
10
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
11
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
12
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
13
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
14
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
15
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
16
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
17
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
18
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
19
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
20
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
21
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
22
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
23
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
24
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
25
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
26
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
27
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
28
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
29
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.4%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.4%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.4%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.4%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.4%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.4%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21540
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47ae-xdqr-6qgb
10
url VCID-4snj-etwf-eqe8
vulnerability_id VCID-4snj-etwf-eqe8
summary openjdk: Improve HttpServer Request handling (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21933
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09035
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.08951
published_at 2026-04-18T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09091
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09077
published_at 2026-04-13T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.08972
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09086
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.0901
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0909
published_at 2026-04-08T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09121
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09122
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429926
reference_id 2429926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429926
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:56:13Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2026-21933
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4snj-etwf-eqe8
11
url VCID-4thy-7844-xuc9
vulnerability_id VCID-4thy-7844-xuc9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21360
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-16T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29608
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041491
reference_id 2041491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041491
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21360
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4thy-7844-xuc9
12
url VCID-5et1-ytak-xqh7
vulnerability_id VCID-5et1-ytak-xqh7
summary OpenJDK: Excessive symbol length can lead to infinite loop (8319859)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.56205
published_at 2026-04-18T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56201
published_at 2026-04-09T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.5621
published_at 2026-04-11T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56186
published_at 2026-04-12T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.5617
published_at 2026-04-13T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56203
published_at 2026-04-16T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56144
published_at 2026-04-07T12:55:00Z
7
value 0.00333
scoring_system epss
scoring_elements 0.56165
published_at 2026-04-04T12:55:00Z
8
value 0.00333
scoring_system epss
scoring_elements 0.56195
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
reference_id 2297962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21138
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5et1-ytak-xqh7
13
url VCID-5xg6-kds9-g3hf
vulnerability_id VCID-5xg6-kds9-g3hf
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21294
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-16T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29608
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041427
reference_id 2041427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041427
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21294
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xg6-kds9-g3hf
14
url VCID-6196-gvhx-ruh8
vulnerability_id VCID-6196-gvhx-ruh8
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38355
published_at 2026-04-08T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38417
published_at 2026-04-02T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38441
published_at 2026-04-04T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38305
published_at 2026-04-07T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38363
published_at 2026-04-09T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.3838
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.4421
published_at 2026-04-18T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.4422
published_at 2026-04-16T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44159
published_at 2026-04-13T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.44158
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
reference_id 2318534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.13%2B11-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.13%2B11-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.13%2B11-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-2~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21235
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6196-gvhx-ruh8
15
url VCID-6wtu-f43b-1ue9
vulnerability_id VCID-6wtu-f43b-1ue9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35559
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30596
published_at 2026-04-07T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30609
published_at 2026-04-18T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30627
published_at 2026-04-16T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30602
published_at 2026-04-13T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30687
published_at 2026-04-09T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30647
published_at 2026-04-12T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30781
published_at 2026-04-04T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30692
published_at 2026-04-11T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30654
published_at 2026-04-08T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30732
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014518
reference_id 2014518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014518
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
43
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
44
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%252Bdeb11u2%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-35559
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wtu-f43b-1ue9
16
url VCID-6zn4-b8k4-3bcn
vulnerability_id VCID-6zn4-b8k4-3bcn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35586
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37711
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-08T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-02T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37839
published_at 2026-04-18T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37812
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37837
published_at 2026-04-12T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37874
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37859
published_at 2026-04-16T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37796
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015308
reference_id 2015308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015308
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
41
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
42
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%252Bdeb11u2%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-35586
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6zn4-b8k4-3bcn
17
url VCID-76rb-sg3r-bqce
vulnerability_id VCID-76rb-sg3r-bqce
summary OpenJDK: potential UTF8 size overflow (8314794)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.6333
published_at 2026-04-18T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63303
published_at 2026-04-08T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63321
published_at 2026-04-09T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-11T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-16T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63286
published_at 2026-04-13T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63258
published_at 2026-04-02T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63287
published_at 2026-04-04T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63252
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
reference_id 2297961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21131
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76rb-sg3r-bqce
18
url VCID-8cup-qnc8-wudx
vulnerability_id VCID-8cup-qnc8-wudx
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55506
published_at 2026-04-18T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55465
published_at 2026-04-04T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55444
published_at 2026-04-07T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-09T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55505
published_at 2026-04-11T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55483
published_at 2026-04-12T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55466
published_at 2026-04-13T12:55:00Z
7
value 0.00324
scoring_system epss
scoring_elements 0.55503
published_at 2026-04-16T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55441
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
reference_id 2257837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-20952
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cup-qnc8-wudx
19
url VCID-8wud-7t2q-xfa3
vulnerability_id VCID-8wud-7t2q-xfa3
summary OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21968.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21968
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23693
published_at 2026-04-02T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23735
published_at 2026-04-04T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25179
published_at 2026-04-09T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25193
published_at 2026-04-11T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.2515
published_at 2026-04-12T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25098
published_at 2026-04-13T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25108
published_at 2026-04-16T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25099
published_at 2026-04-18T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25064
published_at 2026-04-07T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.25134
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21968
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187802
reference_id 2187802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187802
18
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
19
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
20
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
21
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
22
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
23
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
24
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
25
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
26
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
27
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
28
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
29
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
30
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
31
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
32
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
33
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
34
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
35
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
36
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
37
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
38
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
39
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
40
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
41
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
42
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
43
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
44
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
45
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
46
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
47
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21968
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wud-7t2q-xfa3
20
url VCID-97bv-kegv-uyd9
vulnerability_id VCID-97bv-kegv-uyd9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35567
reference_id
reference_type
scores
0
value 0.0022
scoring_system epss
scoring_elements 0.44539
published_at 2026-04-01T12:55:00Z
1
value 0.0022
scoring_system epss
scoring_elements 0.44666
published_at 2026-04-18T12:55:00Z
2
value 0.0022
scoring_system epss
scoring_elements 0.44617
published_at 2026-04-12T12:55:00Z
3
value 0.0022
scoring_system epss
scoring_elements 0.44638
published_at 2026-04-04T12:55:00Z
4
value 0.0022
scoring_system epss
scoring_elements 0.44576
published_at 2026-04-07T12:55:00Z
5
value 0.0022
scoring_system epss
scoring_elements 0.44628
published_at 2026-04-08T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.4463
published_at 2026-04-09T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44647
published_at 2026-04-11T12:55:00Z
8
value 0.0022
scoring_system epss
scoring_elements 0.44618
published_at 2026-04-13T12:55:00Z
9
value 0.0022
scoring_system epss
scoring_elements 0.44673
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015658
reference_id 2015658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015658
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%252Bdeb11u2%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-35567
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97bv-kegv-uyd9
21
url VCID-98bc-5jrc-5kas
vulnerability_id VCID-98bc-5jrc-5kas
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21341
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-16T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29608
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041897
reference_id 2041897
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041897
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21341
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-98bc-5jrc-5kas
22
url VCID-9n5v-4daz-eyc2
vulnerability_id VCID-9n5v-4daz-eyc2
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26589
published_at 2026-04-18T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26668
published_at 2026-04-12T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26611
published_at 2026-04-13T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26618
published_at 2026-04-16T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26767
published_at 2026-04-02T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26807
published_at 2026-04-04T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26591
published_at 2026-04-07T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26658
published_at 2026-04-08T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-09T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
reference_id 2318530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.13%2B11-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.13%2B11-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.13%2B11-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-2~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21217
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5v-4daz-eyc2
23
url VCID-9urr-3gt2-mfhe
vulnerability_id VCID-9urr-3gt2-mfhe
summary OpenJDK: long Exception message leading to crash (8319851)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.56729
published_at 2026-04-18T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-04T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56732
published_at 2026-04-08T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-09T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-11T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56721
published_at 2026-04-12T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.567
published_at 2026-04-13T12:55:00Z
7
value 0.00339
scoring_system epss
scoring_elements 0.56731
published_at 2026-04-16T12:55:00Z
8
value 0.00339
scoring_system epss
scoring_elements 0.5668
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
reference_id 2274977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
25
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
26
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
27
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
28
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
29
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
30
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
31
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
32
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
33
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
34
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
35
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
36
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
37
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
38
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
39
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
40
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
41
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21011
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9urr-3gt2-mfhe
24
url VCID-9uzg-sja9-hkcy
vulnerability_id VCID-9uzg-sja9-hkcy
summary OpenJDK: Swing HTML parsing issue (8296832)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21939.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21939
reference_id
reference_type
scores
0
value 0.01861
scoring_system epss
scoring_elements 0.83001
published_at 2026-04-02T12:55:00Z
1
value 0.01861
scoring_system epss
scoring_elements 0.83087
published_at 2026-04-18T12:55:00Z
2
value 0.01861
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-04T12:55:00Z
3
value 0.01861
scoring_system epss
scoring_elements 0.83012
published_at 2026-04-07T12:55:00Z
4
value 0.01861
scoring_system epss
scoring_elements 0.83037
published_at 2026-04-08T12:55:00Z
5
value 0.01861
scoring_system epss
scoring_elements 0.83044
published_at 2026-04-09T12:55:00Z
6
value 0.01861
scoring_system epss
scoring_elements 0.83059
published_at 2026-04-11T12:55:00Z
7
value 0.01861
scoring_system epss
scoring_elements 0.83053
published_at 2026-04-12T12:55:00Z
8
value 0.01861
scoring_system epss
scoring_elements 0.83048
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21939
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187724
reference_id 2187724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187724
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21939
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9uzg-sja9-hkcy
25
url VCID-a282-ksr4-j3cu
vulnerability_id VCID-a282-ksr4-j3cu
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26809
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26849
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26634
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26702
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26753
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26756
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26712
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26655
published_at 2026-04-13T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26664
published_at 2026-04-16T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26636
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
reference_id 2243627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
6
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
7
reference_url https://access.redhat.com/errata/RHSA-2023:5725
reference_id RHSA-2023:5725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5725
8
reference_url https://access.redhat.com/errata/RHSA-2023:5726
reference_id RHSA-2023:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5726
9
reference_url https://access.redhat.com/errata/RHSA-2023:5727
reference_id RHSA-2023:5727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5727
10
reference_url https://access.redhat.com/errata/RHSA-2023:5728
reference_id RHSA-2023:5728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5728
11
reference_url https://access.redhat.com/errata/RHSA-2023:5729
reference_id RHSA-2023:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5729
12
reference_url https://access.redhat.com/errata/RHSA-2023:5730
reference_id RHSA-2023:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5730
13
reference_url https://access.redhat.com/errata/RHSA-2023:5731
reference_id RHSA-2023:5731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5731
14
reference_url https://access.redhat.com/errata/RHSA-2023:5732
reference_id RHSA-2023:5732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5732
15
reference_url https://access.redhat.com/errata/RHSA-2023:5733
reference_id RHSA-2023:5733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5733
16
reference_url https://access.redhat.com/errata/RHSA-2023:5734
reference_id RHSA-2023:5734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5734
17
reference_url https://access.redhat.com/errata/RHSA-2023:5735
reference_id RHSA-2023:5735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5735
18
reference_url https://access.redhat.com/errata/RHSA-2023:5736
reference_id RHSA-2023:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5736
19
reference_url https://access.redhat.com/errata/RHSA-2023:5737
reference_id RHSA-2023:5737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5737
20
reference_url https://access.redhat.com/errata/RHSA-2023:5739
reference_id RHSA-2023:5739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5739
21
reference_url https://access.redhat.com/errata/RHSA-2023:5740
reference_id RHSA-2023:5740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5740
22
reference_url https://access.redhat.com/errata/RHSA-2023:5741
reference_id RHSA-2023:5741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5741
23
reference_url https://access.redhat.com/errata/RHSA-2023:5742
reference_id RHSA-2023:5742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5742
24
reference_url https://access.redhat.com/errata/RHSA-2023:5743
reference_id RHSA-2023:5743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5743
25
reference_url https://access.redhat.com/errata/RHSA-2023:5744
reference_id RHSA-2023:5744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5744
26
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
27
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
28
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
29
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
30
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
31
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
32
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
33
reference_url https://access.redhat.com/errata/RHSA-2023:5761
reference_id RHSA-2023:5761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5761
34
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
35
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
36
reference_url https://access.redhat.com/errata/RHSA-2024:0866
reference_id RHSA-2024:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0866
37
reference_url https://access.redhat.com/errata/RHSA-2024:0879
reference_id RHSA-2024:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0879
38
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
39
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.9%2B9-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.9%2B9-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.9%252B9-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.9%2B9-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.9%2B9-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.9%252B9-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.9%2B9-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.9%2B9-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.9%252B9-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-22081
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a282-ksr4-j3cu
26
url VCID-a3xk-3wya-s3gm
vulnerability_id VCID-a3xk-3wya-s3gm
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-02T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.2325
published_at 2026-04-04T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-07T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23112
published_at 2026-04-08T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23165
published_at 2026-04-09T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23185
published_at 2026-04-11T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23147
published_at 2026-04-12T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23089
published_at 2026-04-13T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23104
published_at 2026-04-16T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23096
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
reference_id 2160421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
27
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
28
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
29
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
30
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21835
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3xk-3wya-s3gm
27
url VCID-a59u-h67v-yygm
vulnerability_id VCID-a59u-h67v-yygm
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22041.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22041.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22041
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22241
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22289
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22073
published_at 2026-04-07T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22154
published_at 2026-04-08T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22208
published_at 2026-04-09T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22229
published_at 2026-04-11T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22188
published_at 2026-04-12T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22128
published_at 2026-04-13T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22127
published_at 2026-04-16T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22122
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22041
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2223207
reference_id 2223207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2223207
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1~deb12u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-22041
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a59u-h67v-yygm
28
url VCID-a95g-84vs-xbav
vulnerability_id VCID-a95g-84vs-xbav
summary OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21476
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40188
published_at 2026-04-18T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40224
published_at 2026-04-11T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-12T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40168
published_at 2026-04-13T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40218
published_at 2026-04-16T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40842
published_at 2026-04-04T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40767
published_at 2026-04-07T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40817
published_at 2026-04-08T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40824
published_at 2026-04-09T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40815
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010597
reference_id 1010597
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010597
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075842
reference_id 2075842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075842
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
15
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
16
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
17
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
18
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
19
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
20
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
21
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
22
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
23
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
24
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
25
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
26
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
27
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
28
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
29
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
30
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
31
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
32
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
33
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
34
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
35
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
36
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
37
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21476
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a95g-84vs-xbav
29
url VCID-apsn-z1br-3bdy
vulnerability_id VCID-apsn-z1br-3bdy
summary openjdk: Enhance Certificate Checking (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21945
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16874
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16672
published_at 2026-04-18T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16786
published_at 2026-04-12T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16728
published_at 2026-04-13T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16664
published_at 2026-04-16T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1693
published_at 2026-04-04T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16714
published_at 2026-04-07T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16799
published_at 2026-04-08T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16854
published_at 2026-04-09T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16832
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429927
reference_id 2429927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429927
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:04:39Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2026-21945
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apsn-z1br-3bdy
30
url VCID-b32x-4pu4-jkh4
vulnerability_id VCID-b32x-4pu4-jkh4
summary openjdk: Better Glyph drawing (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30749
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.6625
published_at 2026-04-02T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66294
published_at 2026-04-08T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66277
published_at 2026-04-04T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66247
published_at 2026-04-07T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66307
published_at 2026-04-09T12:55:00Z
5
value 0.00672
scoring_system epss
scoring_elements 0.71355
published_at 2026-04-13T12:55:00Z
6
value 0.00672
scoring_system epss
scoring_elements 0.71388
published_at 2026-04-11T12:55:00Z
7
value 0.00672
scoring_system epss
scoring_elements 0.71372
published_at 2026-04-12T12:55:00Z
8
value 0.00672
scoring_system epss
scoring_elements 0.71401
published_at 2026-04-16T12:55:00Z
9
value 0.00672
scoring_system epss
scoring_elements 0.71407
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376783
reference_id 2376783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376783
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:23:21Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
22
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
23
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
24
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
25
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
26
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
27
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
28
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-30749
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b32x-4pu4-jkh4
31
url VCID-bqav-d2f9-x7d1
vulnerability_id VCID-bqav-d2f9-x7d1
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2161
reference_id
reference_type
scores
0
value 0.01404
scoring_system epss
scoring_elements 0.80398
published_at 2026-04-01T12:55:00Z
1
value 0.01404
scoring_system epss
scoring_elements 0.80481
published_at 2026-04-18T12:55:00Z
2
value 0.01404
scoring_system epss
scoring_elements 0.8048
published_at 2026-04-16T12:55:00Z
3
value 0.01404
scoring_system epss
scoring_elements 0.80452
published_at 2026-04-13T12:55:00Z
4
value 0.01404
scoring_system epss
scoring_elements 0.80404
published_at 2026-04-02T12:55:00Z
5
value 0.01404
scoring_system epss
scoring_elements 0.80458
published_at 2026-04-12T12:55:00Z
6
value 0.01404
scoring_system epss
scoring_elements 0.80473
published_at 2026-04-11T12:55:00Z
7
value 0.01404
scoring_system epss
scoring_elements 0.80454
published_at 2026-04-09T12:55:00Z
8
value 0.01404
scoring_system epss
scoring_elements 0.80444
published_at 2026-04-08T12:55:00Z
9
value 0.01404
scoring_system epss
scoring_elements 0.80425
published_at 2026-04-04T12:55:00Z
10
value 0.01404
scoring_system epss
scoring_elements 0.80414
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2161
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951231
reference_id 1951231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951231
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
reference_id 5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
5
reference_url https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures
reference_id april-2021.html#fixed-common-vulnerabilities-and-exposures
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures
6
reference_url https://security.archlinux.org/AVG-1865
reference_id AVG-1865
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1865
7
reference_url https://security.archlinux.org/AVG-1866
reference_id AVG-1866
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1866
8
reference_url https://security.archlinux.org/AVG-1867
reference_id AVG-1867
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1867
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
reference_id CFXOKM2233JVGYDOWW77BN54X3GZTIBK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
reference_id CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
11
reference_url https://www.debian.org/security/2021/dsa-4899
reference_id dsa-4899
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://www.debian.org/security/2021/dsa-4899
12
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://security.gentoo.org/glsa/202209-05
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
reference_id MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
14
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
reference_id MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
16
reference_url https://security.netapp.com/advisory/ntap-20210513-0001/
reference_id ntap-20210513-0001
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://security.netapp.com/advisory/ntap-20210513-0001/
17
reference_url https://access.redhat.com/errata/RHSA-2021:1445
reference_id RHSA-2021:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1445
18
reference_url https://access.redhat.com/errata/RHSA-2021:1447
reference_id RHSA-2021:1447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1447
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
reference_id UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
fixed_packages
0
url pkg:deb/debian/openjdk-17@0?distro=sid
purl pkg:deb/debian/openjdk-17@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@0%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-2161
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bqav-d2f9-x7d1
32
url VCID-d6gm-thtx-bqb7
vulnerability_id VCID-d6gm-thtx-bqb7
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20932.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20932
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38506
published_at 2026-04-16T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.38498
published_at 2026-04-08T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.38507
published_at 2026-04-09T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38522
published_at 2026-04-11T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.38484
published_at 2026-04-18T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38459
published_at 2026-04-13T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.3856
published_at 2026-04-02T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38584
published_at 2026-04-04T12:55:00Z
8
value 0.00172
scoring_system epss
scoring_elements 0.38447
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257720
reference_id 2257720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257720
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:51:25Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
13
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
14
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
15
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
16
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
17
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
18
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
19
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-20932
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6gm-thtx-bqb7
33
url VCID-duy9-6f1p-vqah
vulnerability_id VCID-duy9-6f1p-vqah
summary openjdk: Enhance Handling of URIs (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21932
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09259
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09204
published_at 2026-04-18T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09328
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09314
published_at 2026-04-13T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09205
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0931
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09227
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09302
published_at 2026-04-08T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09346
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09356
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429925
reference_id 2429925
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429925
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:55:36Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
8
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
9
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
10
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
11
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
12
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
13
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
14
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
15
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
16
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
17
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
18
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
19
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2026-21932
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duy9-6f1p-vqah
34
url VCID-dwh6-xw5k-mqg8
vulnerability_id VCID-dwh6-xw5k-mqg8
summary OpenJDK: missing string checks for NULL characters (8296622)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21937.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21937.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21937
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25149
published_at 2026-04-02T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24998
published_at 2026-04-18T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25188
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.2496
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25029
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25073
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25087
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25047
published_at 2026-04-12T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24993
published_at 2026-04-13T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25005
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21937
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187790
reference_id 2187790
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187790
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21937
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwh6-xw5k-mqg8
35
url VCID-dyg2-udwy-cud7
vulnerability_id VCID-dyg2-udwy-cud7
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22045
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.36067
published_at 2026-04-18T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36104
published_at 2026-04-11T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36066
published_at 2026-04-12T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.3604
published_at 2026-04-13T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.3603
published_at 2026-04-07T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.3608
published_at 2026-04-16T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36098
published_at 2026-04-09T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42145
published_at 2026-04-02T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42172
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221645
reference_id 2221645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221645
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4166
reference_id RHSA-2023:4166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4166
27
reference_url https://access.redhat.com/errata/RHSA-2023:4167
reference_id RHSA-2023:4167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4167
28
reference_url https://access.redhat.com/errata/RHSA-2023:4168
reference_id RHSA-2023:4168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4168
29
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
30
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
31
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
32
reference_url https://access.redhat.com/errata/RHSA-2023:4172
reference_id RHSA-2023:4172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4172
33
reference_url https://access.redhat.com/errata/RHSA-2023:4173
reference_id RHSA-2023:4173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4173
34
reference_url https://access.redhat.com/errata/RHSA-2023:4174
reference_id RHSA-2023:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4174
35
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
36
reference_url https://access.redhat.com/errata/RHSA-2023:4176
reference_id RHSA-2023:4176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4176
37
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
38
reference_url https://access.redhat.com/errata/RHSA-2023:4178
reference_id RHSA-2023:4178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4178
39
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
40
reference_url https://access.redhat.com/errata/RHSA-2023:4209
reference_id RHSA-2023:4209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4209
41
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
42
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
43
reference_url https://access.redhat.com/errata/RHSA-2023:4212
reference_id RHSA-2023:4212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4212
44
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
45
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
46
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1~deb12u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-22045
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyg2-udwy-cud7
36
url VCID-e6dm-6767-9kdk
vulnerability_id VCID-e6dm-6767-9kdk
summary openjdk: Improve HTTP client header handling (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32274
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32185
published_at 2026-04-08T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32311
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32136
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32212
published_at 2026-04-09T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32603
published_at 2026-04-13T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32669
published_at 2026-04-11T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32631
published_at 2026-04-12T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32641
published_at 2026-04-16T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32619
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
reference_id 2376785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:42:42Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
7
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
8
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
9
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
10
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
11
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
12
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
13
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
14
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
15
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
16
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
17
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
18
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
19
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
20
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
21
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
22
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-50059
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6dm-6767-9kdk
37
url VCID-fau4-ajny-nfbd
vulnerability_id VCID-fau4-ajny-nfbd
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40554
published_at 2026-04-18T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40556
published_at 2026-04-12T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40536
published_at 2026-04-13T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40584
published_at 2026-04-16T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-02T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40592
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40513
published_at 2026-04-07T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40563
published_at 2026-04-08T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40574
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
reference_id 2257859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-20921
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fau4-ajny-nfbd
38
url VCID-fhj9-p1gx-c7hp
vulnerability_id VCID-fhj9-p1gx-c7hp
summary OpenJDK: incorrect enqueue of references in garbage collector (8298191)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21954.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21954
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15089
published_at 2026-04-18T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15288
published_at 2026-04-02T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15357
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15161
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15249
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15301
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.1527
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15232
published_at 2026-04-12T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15167
published_at 2026-04-13T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15081
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187441
reference_id 2187441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187441
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21954
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhj9-p1gx-c7hp
39
url VCID-fwk5-wqvn-4qaz
vulnerability_id VCID-fwk5-wqvn-4qaz
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
reference_id
reference_type
scores
0
value 0.00211
scoring_system epss
scoring_elements 0.43703
published_at 2026-04-18T12:55:00Z
1
value 0.00211
scoring_system epss
scoring_elements 0.43625
published_at 2026-04-07T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.43676
published_at 2026-04-08T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.4368
published_at 2026-04-09T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.437
published_at 2026-04-11T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.43668
published_at 2026-04-12T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.43651
published_at 2026-04-13T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43714
published_at 2026-04-16T12:55:00Z
8
value 0.00211
scoring_system epss
scoring_elements 0.43665
published_at 2026-04-02T12:55:00Z
9
value 0.00211
scoring_system epss
scoring_elements 0.4369
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
reference_id 2257850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
29
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
30
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
31
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
32
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
33
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
34
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-20926
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk5-wqvn-4qaz
40
url VCID-fwv1-sj5y-xygd
vulnerability_id VCID-fwv1-sj5y-xygd
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21619
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49517
published_at 2026-04-02T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49544
published_at 2026-04-04T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49496
published_at 2026-04-07T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49551
published_at 2026-04-08T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49546
published_at 2026-04-09T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49563
published_at 2026-04-11T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49535
published_at 2026-04-12T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49537
published_at 2026-04-13T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49583
published_at 2026-04-16T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.4958
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21619
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133745
reference_id 2133745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133745
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
17
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
18
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
19
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
20
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
21
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
22
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
23
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
24
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
25
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
26
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
27
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
28
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
29
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
30
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
31
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
32
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
33
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
34
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
35
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
36
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.5%252B8-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21619
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwv1-sj5y-xygd
41
url VCID-g2fj-4mgh-23fs
vulnerability_id VCID-g2fj-4mgh-23fs
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21283
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30847
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30894
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32867
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32868
published_at 2026-04-11T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32829
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32803
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32846
published_at 2026-04-16T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32823
published_at 2026-04-18T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.3279
published_at 2026-04-07T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32838
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041400
reference_id 2041400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041400
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21283
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2fj-4mgh-23fs
42
url VCID-gjgy-dfq7-zfb2
vulnerability_id VCID-gjgy-dfq7-zfb2
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22049
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20281
published_at 2026-04-18T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20347
published_at 2026-04-12T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20289
published_at 2026-04-13T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20277
published_at 2026-04-16T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20223
published_at 2026-04-07T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20303
published_at 2026-04-08T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20363
published_at 2026-04-09T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20392
published_at 2026-04-11T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24864
published_at 2026-04-02T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24903
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22049
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221647
reference_id 2221647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221647
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4166
reference_id RHSA-2023:4166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4166
27
reference_url https://access.redhat.com/errata/RHSA-2023:4167
reference_id RHSA-2023:4167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4167
28
reference_url https://access.redhat.com/errata/RHSA-2023:4168
reference_id RHSA-2023:4168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4168
29
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
30
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
31
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
32
reference_url https://access.redhat.com/errata/RHSA-2023:4172
reference_id RHSA-2023:4172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4172
33
reference_url https://access.redhat.com/errata/RHSA-2023:4173
reference_id RHSA-2023:4173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4173
34
reference_url https://access.redhat.com/errata/RHSA-2023:4174
reference_id RHSA-2023:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4174
35
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
36
reference_url https://access.redhat.com/errata/RHSA-2023:4176
reference_id RHSA-2023:4176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4176
37
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
38
reference_url https://access.redhat.com/errata/RHSA-2023:4178
reference_id RHSA-2023:4178
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4178
39
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
40
reference_url https://access.redhat.com/errata/RHSA-2023:4209
reference_id RHSA-2023:4209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4209
41
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
42
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
43
reference_url https://access.redhat.com/errata/RHSA-2023:4212
reference_id RHSA-2023:4212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4212
44
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
45
reference_url https://access.redhat.com/errata/RHSA-2023:4876
reference_id RHSA-2023:4876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4876
46
reference_url https://access.redhat.com/errata/RHSA-2023:4877
reference_id RHSA-2023:4877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4877
47
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
48
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1~deb12u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-22049
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjgy-dfq7-zfb2
43
url VCID-gksn-mb6g-rue5
vulnerability_id VCID-gksn-mb6g-rue5
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35556
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33383
published_at 2026-04-01T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33421
published_at 2026-04-18T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33474
published_at 2026-04-11T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33433
published_at 2026-04-12T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.3341
published_at 2026-04-13T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33446
published_at 2026-04-16T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33519
published_at 2026-04-02T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33552
published_at 2026-04-04T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33392
published_at 2026-04-07T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33437
published_at 2026-04-08T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33471
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014515
reference_id 2014515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014515
14
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
15
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
16
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
17
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
18
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
19
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
20
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
21
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
22
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
23
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
24
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
25
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
26
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
27
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
28
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
29
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
30
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
31
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
32
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
33
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
34
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
35
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
36
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
37
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%252Bdeb11u2%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-35556
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gksn-mb6g-rue5
44
url VCID-h2w2-8e43-j3g6
vulnerability_id VCID-h2w2-8e43-j3g6
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21624
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42206
published_at 2026-04-02T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-09T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42175
published_at 2026-04-07T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42226
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42257
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.4222
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-13T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50243
published_at 2026-04-18T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.50242
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133765
reference_id 2133765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133765
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
17
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
18
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
19
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
20
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
21
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
22
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
23
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
24
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
25
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
26
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
27
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
28
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
29
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
30
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
31
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
32
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
33
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
34
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
35
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
36
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.5%252B8-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21624
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2w2-8e43-j3g6
45
url VCID-h7n1-qfs3-v3fw
vulnerability_id VCID-h7n1-qfs3-v3fw
summary OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35005
published_at 2026-04-18T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.34962
published_at 2026-04-07T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35007
published_at 2026-04-08T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35036
published_at 2026-04-09T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-11T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35004
published_at 2026-04-12T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.3498
published_at 2026-04-13T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-16T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35055
published_at 2026-04-02T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
reference_id 2274975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
20
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
21
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
22
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
23
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
24
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
25
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
26
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
27
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
28
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
29
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
30
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
31
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
32
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
33
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21012
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7n1-qfs3-v3fw
46
url VCID-hdz7-kcy9-juah
vulnerability_id VCID-hdz7-kcy9-juah
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35564
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28817
published_at 2026-04-01T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.2877
published_at 2026-04-18T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28793
published_at 2026-04-16T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28773
published_at 2026-04-13T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28948
published_at 2026-04-04T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28755
published_at 2026-04-07T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28898
published_at 2026-04-02T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-11T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28862
published_at 2026-04-09T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28822
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015061
reference_id 2015061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015061
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
43
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
44
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%252Bdeb11u2%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-35564
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz7-kcy9-juah
47
url VCID-he8f-erpk-sqh8
vulnerability_id VCID-he8f-erpk-sqh8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38981
published_at 2026-04-01T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-08T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.3916
published_at 2026-04-18T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.3919
published_at 2026-04-16T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39136
published_at 2026-04-13T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39155
published_at 2026-04-12T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39192
published_at 2026-04-11T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.3918
published_at 2026-04-09T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39189
published_at 2026-04-04T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
reference_id 2014524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
43
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
44
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%252Bdeb11u2%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-35561
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he8f-erpk-sqh8
48
url VCID-hx4c-96gx-2fbq
vulnerability_id VCID-hx4c-96gx-2fbq
summary OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21426
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19371
published_at 2026-04-09T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19476
published_at 2026-04-02T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19231
published_at 2026-04-16T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19268
published_at 2026-04-13T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19326
published_at 2026-04-12T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19374
published_at 2026-04-11T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19524
published_at 2026-04-04T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.1924
published_at 2026-04-18T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19319
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075788
reference_id 2075788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075788
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
39
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
40
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
41
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
42
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21426
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hx4c-96gx-2fbq
49
url VCID-jm9f-9y4b-qye7
vulnerability_id VCID-jm9f-9y4b-qye7
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39399
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.52035
published_at 2026-04-02T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52061
published_at 2026-04-04T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52027
published_at 2026-04-07T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52081
published_at 2026-04-08T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52077
published_at 2026-04-09T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52129
published_at 2026-04-11T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52113
published_at 2026-04-12T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52098
published_at 2026-04-13T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52138
published_at 2026-04-16T12:55:00Z
9
value 0.00286
scoring_system epss
scoring_elements 0.52142
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39399
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133776
reference_id 2133776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133776
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
17
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
18
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
19
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
20
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
21
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
22
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
23
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
24
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
25
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
26
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.5%252B8-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-39399
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jm9f-9y4b-qye7
50
url VCID-jw6x-cntu-nfht
vulnerability_id VCID-jw6x-cntu-nfht
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22036.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22036.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22036
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26986
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.27022
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26812
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26881
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26928
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26932
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26888
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26831
published_at 2026-04-13T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-16T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26809
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22036
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221634
reference_id 2221634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221634
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1~deb12u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-22036
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jw6x-cntu-nfht
51
url VCID-jztz-7cuw-t7ep
vulnerability_id VCID-jztz-7cuw-t7ep
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12082
published_at 2026-04-18T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12229
published_at 2026-04-12T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12193
published_at 2026-04-13T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.1208
published_at 2026-04-16T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12285
published_at 2026-04-02T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12331
published_at 2026-04-04T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.1213
published_at 2026-04-07T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12211
published_at 2026-04-08T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.1226
published_at 2026-04-09T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12267
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
reference_id 2257874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-20945
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jztz-7cuw-t7ep
52
url VCID-kngz-x6mk-fqer
vulnerability_id VCID-kngz-x6mk-fqer
summary OpenJDK: Improper ECDSA signature verification (Libraries, 8277233)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21449.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21449.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21449
reference_id
reference_type
scores
0
value 0.34335
scoring_system epss
scoring_elements 0.96984
published_at 2026-04-11T12:55:00Z
1
value 0.34335
scoring_system epss
scoring_elements 0.96998
published_at 2026-04-18T12:55:00Z
2
value 0.34335
scoring_system epss
scoring_elements 0.96986
published_at 2026-04-13T12:55:00Z
3
value 0.34335
scoring_system epss
scoring_elements 0.96995
published_at 2026-04-16T12:55:00Z
4
value 0.34898
scoring_system epss
scoring_elements 0.97016
published_at 2026-04-08T12:55:00Z
5
value 0.34898
scoring_system epss
scoring_elements 0.97001
published_at 2026-04-02T12:55:00Z
6
value 0.34898
scoring_system epss
scoring_elements 0.97005
published_at 2026-04-04T12:55:00Z
7
value 0.34898
scoring_system epss
scoring_elements 0.97017
published_at 2026-04-09T12:55:00Z
8
value 0.34898
scoring_system epss
scoring_elements 0.97006
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21449
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url http://www.openwall.com/lists/oss-security/2022/04/29/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/29/1
10
reference_url http://www.openwall.com/lists/oss-security/2022/04/30/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/30/1
11
reference_url http://www.openwall.com/lists/oss-security/2022/05/01/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/05/01/1
12
reference_url http://www.openwall.com/lists/oss-security/2022/05/02/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/05/02/1
13
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/2
14
reference_url http://www.openwall.com/lists/oss-security/2022/04/30/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/30/2
15
reference_url http://www.openwall.com/lists/oss-security/2022/05/01/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/05/01/2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075821
reference_id 2075821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075821
17
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/3
reference_id 3
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/3
18
reference_url http://www.openwall.com/lists/oss-security/2022/04/30/3
reference_id 3
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/30/3
19
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/4
reference_id 4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/4
20
reference_url http://www.openwall.com/lists/oss-security/2022/04/30/4
reference_id 4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/30/4
21
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/5
22
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/6
reference_id 6
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/6
23
reference_url http://www.openwall.com/lists/oss-security/2022/04/28/7
reference_id 7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url http://www.openwall.com/lists/oss-security/2022/04/28/7
24
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
25
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
26
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url https://www.debian.org/security/2022/dsa-5128
27
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url https://www.debian.org/security/2022/dsa-5131
28
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:54Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
29
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
30
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
31
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
32
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
33
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
34
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21449
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kngz-x6mk-fqer
53
url VCID-kq78-adbv-67a7
vulnerability_id VCID-kq78-adbv-67a7
summary OpenJDK: improper connection handling during TLS handshake (8294474)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21930
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36242
published_at 2026-04-18T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36276
published_at 2026-04-11T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36239
published_at 2026-04-12T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36214
published_at 2026-04-13T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36258
published_at 2026-04-16T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36941
published_at 2026-04-04T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36908
published_at 2026-04-02T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36839
published_at 2026-04-09T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36824
published_at 2026-04-08T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36774
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21930
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187435
reference_id 2187435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187435
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21930
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kq78-adbv-67a7
54
url VCID-m3e1-5tfw-uyhv
vulnerability_id VCID-m3e1-5tfw-uyhv
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21618.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21618
reference_id
reference_type
scores
0
value 0.00292
scoring_system epss
scoring_elements 0.52551
published_at 2026-04-02T12:55:00Z
1
value 0.00292
scoring_system epss
scoring_elements 0.52577
published_at 2026-04-04T12:55:00Z
2
value 0.00292
scoring_system epss
scoring_elements 0.52544
published_at 2026-04-07T12:55:00Z
3
value 0.00292
scoring_system epss
scoring_elements 0.52595
published_at 2026-04-08T12:55:00Z
4
value 0.00292
scoring_system epss
scoring_elements 0.52589
published_at 2026-04-09T12:55:00Z
5
value 0.00292
scoring_system epss
scoring_elements 0.52639
published_at 2026-04-11T12:55:00Z
6
value 0.00292
scoring_system epss
scoring_elements 0.52623
published_at 2026-04-12T12:55:00Z
7
value 0.00292
scoring_system epss
scoring_elements 0.52609
published_at 2026-04-13T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.52648
published_at 2026-04-16T12:55:00Z
9
value 0.00292
scoring_system epss
scoring_elements 0.52655
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21618
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133817
reference_id 2133817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133817
11
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
12
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
13
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
14
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
15
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
16
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
17
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
18
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
19
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
20
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
21
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
22
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
23
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
24
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
25
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.5%252B8-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21618
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3e1-5tfw-uyhv
55
url VCID-mt9c-tby1-wqe9
vulnerability_id VCID-mt9c-tby1-wqe9
summary openjdk: Improve JMX connections (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21925
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10163
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10082
published_at 2026-04-18T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10251
published_at 2026-04-12T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10232
published_at 2026-04-13T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10104
published_at 2026-04-16T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10229
published_at 2026-04-04T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10125
published_at 2026-04-07T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.102
published_at 2026-04-08T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.1026
published_at 2026-04-09T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10292
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429924
reference_id 2429924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429924
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:50:27Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.18%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.18%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.18%252B8-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2026-21925
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt9c-tby1-wqe9
56
url VCID-mumk-x95v-bfc8
vulnerability_id VCID-mumk-x95v-bfc8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21366
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37445
published_at 2026-04-02T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.3747
published_at 2026-04-04T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75391
published_at 2026-04-09T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75378
published_at 2026-04-13T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.7542
published_at 2026-04-16T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75426
published_at 2026-04-18T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041789
reference_id 2041789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041789
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21366
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mumk-x95v-bfc8
57
url VCID-n71d-tx76-vbbd
vulnerability_id VCID-n71d-tx76-vbbd
summary OpenJDK: Out-of-bounds access in 2D image handling (8324559)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-18T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63647
published_at 2026-04-08T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63663
published_at 2026-04-12T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63678
published_at 2026-04-11T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.6363
published_at 2026-04-13T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63666
published_at 2026-04-16T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-02T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63636
published_at 2026-04-04T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63595
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
reference_id 2297976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21145
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n71d-tx76-vbbd
58
url VCID-ne6z-gg9f-qkcy
vulnerability_id VCID-ne6z-gg9f-qkcy
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21282
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.33007
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.33041
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32918
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3295
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32912
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32887
published_at 2026-04-13T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32926
published_at 2026-04-16T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32904
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21282
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041435
reference_id 2041435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041435
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21282
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne6z-gg9f-qkcy
59
url VCID-nr6u-aysf-7kgk
vulnerability_id VCID-nr6u-aysf-7kgk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.38222
published_at 2026-04-18T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.3822
published_at 2026-04-12T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38196
published_at 2026-04-13T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.38242
published_at 2026-04-16T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38286
published_at 2026-04-02T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38309
published_at 2026-04-04T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38178
published_at 2026-04-07T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38228
published_at 2026-04-08T12:55:00Z
8
value 0.0017
scoring_system epss
scoring_elements 0.38237
published_at 2026-04-09T12:55:00Z
9
value 0.0017
scoring_system epss
scoring_elements 0.38255
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
reference_id 2257853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
39
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
40
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
41
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-20919
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nr6u-aysf-7kgk
60
url VCID-ntga-y6cv-a3df
vulnerability_id VCID-ntga-y6cv-a3df
summary openjdk: Enhance array handling (Oracle CPU 2025-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-02T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42078
published_at 2026-04-18T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42079
published_at 2026-04-12T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42054
published_at 2026-04-13T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-16T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-04T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42029
published_at 2026-04-07T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42081
published_at 2026-04-08T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42094
published_at 2026-04-09T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42116
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
reference_id 2338992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
15
reference_url https://www.oracle.com/security-alerts/cpujan2025.html
reference_id cpujan2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:29:12Z/
url https://www.oracle.com/security-alerts/cpujan2025.html
16
reference_url https://access.redhat.com/errata/RHSA-2025:0421
reference_id RHSA-2025:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0421
17
reference_url https://access.redhat.com/errata/RHSA-2025:0422
reference_id RHSA-2025:0422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0422
18
reference_url https://access.redhat.com/errata/RHSA-2025:0423
reference_id RHSA-2025:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0423
19
reference_url https://access.redhat.com/errata/RHSA-2025:0424
reference_id RHSA-2025:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0424
20
reference_url https://access.redhat.com/errata/RHSA-2025:0425
reference_id RHSA-2025:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0425
21
reference_url https://access.redhat.com/errata/RHSA-2025:0426
reference_id RHSA-2025:0426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0426
22
reference_url https://access.redhat.com/errata/RHSA-2025:0427
reference_id RHSA-2025:0427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0427
23
reference_url https://access.redhat.com/errata/RHSA-2025:0428
reference_id RHSA-2025:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0428
24
reference_url https://access.redhat.com/errata/RHSA-2025:0429
reference_id RHSA-2025:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0429
25
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
26
reference_url https://access.redhat.com/errata/RHSA-2025:2615
reference_id RHSA-2025:2615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2615
27
reference_url https://usn.ubuntu.com/7252-1/
reference_id USN-7252-1
reference_type
scores
url https://usn.ubuntu.com/7252-1/
28
reference_url https://usn.ubuntu.com/7253-1/
reference_id USN-7253-1
reference_type
scores
url https://usn.ubuntu.com/7253-1/
29
reference_url https://usn.ubuntu.com/7254-1/
reference_id USN-7254-1
reference_type
scores
url https://usn.ubuntu.com/7254-1/
30
reference_url https://usn.ubuntu.com/7255-1/
reference_id USN-7255-1
reference_type
scores
url https://usn.ubuntu.com/7255-1/
31
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
32
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.14%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.14%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.14%252B7-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.14%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.14%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.14%252B7-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.14%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.14%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.14%252B7-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-21502
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntga-y6cv-a3df
61
url VCID-nxx8-nehy-qyhg
vulnerability_id VCID-nxx8-nehy-qyhg
summary openjdk: Enhance Path Factories (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53066
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17286
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17078
published_at 2026-04-18T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17193
published_at 2026-04-12T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17132
published_at 2026-04-13T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17073
published_at 2026-04-16T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17335
published_at 2026-04-04T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17115
published_at 2026-04-07T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17207
published_at 2026-04-08T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17263
published_at 2026-04-09T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
reference_id 1118944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403063
reference_id 2403063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403063
6
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T19:44:34Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:18814
reference_id RHSA-2025:18814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18814
8
reference_url https://access.redhat.com/errata/RHSA-2025:18815
reference_id RHSA-2025:18815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18815
9
reference_url https://access.redhat.com/errata/RHSA-2025:18816
reference_id RHSA-2025:18816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18816
10
reference_url https://access.redhat.com/errata/RHSA-2025:18817
reference_id RHSA-2025:18817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18817
11
reference_url https://access.redhat.com/errata/RHSA-2025:18818
reference_id RHSA-2025:18818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18818
12
reference_url https://access.redhat.com/errata/RHSA-2025:18819
reference_id RHSA-2025:18819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18819
13
reference_url https://access.redhat.com/errata/RHSA-2025:18820
reference_id RHSA-2025:18820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18820
14
reference_url https://access.redhat.com/errata/RHSA-2025:18821
reference_id RHSA-2025:18821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18821
15
reference_url https://access.redhat.com/errata/RHSA-2025:18822
reference_id RHSA-2025:18822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18822
16
reference_url https://access.redhat.com/errata/RHSA-2025:18823
reference_id RHSA-2025:18823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18823
17
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
18
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
19
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
20
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
21
reference_url https://access.redhat.com/errata/RHSA-2025:22370
reference_id RHSA-2025:22370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22370
22
reference_url https://access.redhat.com/errata/RHSA-2025:22672
reference_id RHSA-2025:22672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22672
23
reference_url https://usn.ubuntu.com/7881-1/
reference_id USN-7881-1
reference_type
scores
url https://usn.ubuntu.com/7881-1/
24
reference_url https://usn.ubuntu.com/7882-1/
reference_id USN-7882-1
reference_type
scores
url https://usn.ubuntu.com/7882-1/
25
reference_url https://usn.ubuntu.com/7883-1/
reference_id USN-7883-1
reference_type
scores
url https://usn.ubuntu.com/7883-1/
26
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
27
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
28
reference_url https://usn.ubuntu.com/7900-1/
reference_id USN-7900-1
reference_type
scores
url https://usn.ubuntu.com/7900-1/
29
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
30
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-53066
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxx8-nehy-qyhg
62
url VCID-p5ye-19wy-ayb8
vulnerability_id VCID-p5ye-19wy-ayb8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31435
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-11T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.3157
published_at 2026-04-02T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31453
published_at 2026-04-18T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31474
published_at 2026-04-16T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.3144
published_at 2026-04-13T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-12T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31613
published_at 2026-04-04T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31432
published_at 2026-04-07T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31485
published_at 2026-04-08T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31514
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
reference_id 2015311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
41
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
42
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%252Bdeb11u2%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-35603
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ye-19wy-ayb8
63
url VCID-p9na-7jta-9yg4
vulnerability_id VCID-p9na-7jta-9yg4
summary openjdk: Enhance TLS protocol support (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30754
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.3003
published_at 2026-04-02T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.29952
published_at 2026-04-08T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.30077
published_at 2026-04-04T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.29891
published_at 2026-04-07T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.29988
published_at 2026-04-09T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30305
published_at 2026-04-13T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30396
published_at 2026-04-11T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30352
published_at 2026-04-12T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30321
published_at 2026-04-16T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30304
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376784
reference_id 2376784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376784
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T15:31:20Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
22
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
23
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
24
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
25
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
26
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
27
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-30754
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9na-7jta-9yg4
64
url VCID-q5gr-6u92-6ybk
vulnerability_id VCID-q5gr-6u92-6ybk
summary OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21938
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25149
published_at 2026-04-02T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24998
published_at 2026-04-18T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25188
published_at 2026-04-04T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.2496
published_at 2026-04-07T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25029
published_at 2026-04-08T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25073
published_at 2026-04-09T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25087
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25047
published_at 2026-04-12T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24993
published_at 2026-04-13T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25005
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21938
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187758
reference_id 2187758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187758
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21938
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5gr-6u92-6ybk
65
url VCID-rfs8-njaq-qkc8
vulnerability_id VCID-rfs8-njaq-qkc8
summary
Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.

A fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.
references
0
reference_url http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-34169
reference_id
reference_type
scores
0
value 0.06658
scoring_system epss
scoring_elements 0.91216
published_at 2026-04-12T12:55:00Z
1
value 0.06658
scoring_system epss
scoring_elements 0.91212
published_at 2026-04-11T12:55:00Z
2
value 0.06658
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-09T12:55:00Z
3
value 0.06658
scoring_system epss
scoring_elements 0.91199
published_at 2026-04-08T12:55:00Z
4
value 0.06658
scoring_system epss
scoring_elements 0.91186
published_at 2026-04-07T12:55:00Z
5
value 0.06658
scoring_system epss
scoring_elements 0.91215
published_at 2026-04-13T12:55:00Z
6
value 0.06658
scoring_system epss
scoring_elements 0.91239
published_at 2026-04-18T12:55:00Z
7
value 0.08992
scoring_system epss
scoring_elements 0.92592
published_at 2026-04-04T12:55:00Z
8
value 0.08992
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-34169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git
9
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
10
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
11
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
12
reference_url https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
13
reference_url https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
14
reference_url https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
15
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-34169
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-34169
29
reference_url https://security.gentoo.org/glsa/202401-25
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202401-25
30
reference_url https://security.netapp.com/advisory/ntap-20220729-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220729-0009
31
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
32
reference_url https://www.debian.org/security/2022/dsa-5188
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5188
33
reference_url https://www.debian.org/security/2022/dsa-5192
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5192
34
reference_url https://www.debian.org/security/2022/dsa-5256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5256
35
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
36
reference_url https://xalan.apache.org
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://xalan.apache.org
37
reference_url http://www.openwall.com/lists/oss-security/2022/07/19/5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/19/5
38
reference_url http://www.openwall.com/lists/oss-security/2022/07/19/6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/19/6
39
reference_url http://www.openwall.com/lists/oss-security/2022/07/20/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/20/2
40
reference_url http://www.openwall.com/lists/oss-security/2022/07/20/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/20/3
41
reference_url http://www.openwall.com/lists/oss-security/2022/10/18/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/18/2
42
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/04/8
43
reference_url http://www.openwall.com/lists/oss-security/2022/11/07/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/07/2
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860
reference_id 1015860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108554
reference_id 2108554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108554
46
reference_url https://github.com/advisories/GHSA-9339-86wc-4qgf
reference_id GHSA-9339-86wc-4qgf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9339-86wc-4qgf
47
reference_url https://security.gentoo.org/glsa/202405-16
reference_id GLSA-202405-16
reference_type
scores
url https://security.gentoo.org/glsa/202405-16
48
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
49
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
50
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
51
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
52
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
53
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
54
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
55
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
56
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
57
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
58
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
59
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
60
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
61
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
62
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
63
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
64
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
65
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
66
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
67
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
68
reference_url https://access.redhat.com/errata/RHSA-2024:3708
reference_id RHSA-2024:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3708
69
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
70
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.4%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.4%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.4%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.4%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.4%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.4%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-34169, GHSA-9339-86wc-4qgf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfs8-njaq-qkc8
66
url VCID-rgbz-akft-f7e6
vulnerability_id VCID-rgbz-akft-f7e6
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21296
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.33007
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.33041
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32918
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3295
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32912
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32887
published_at 2026-04-13T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32926
published_at 2026-04-16T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32904
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041439
reference_id 2041439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041439
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21296
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-akft-f7e6
67
url VCID-rggy-f3va-mfay
vulnerability_id VCID-rggy-f3va-mfay
summary OpenJDK: RangeCheckElimination array index overflow (8323231)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
reference_id
reference_type
scores
0
value 0.00721
scoring_system epss
scoring_elements 0.72531
published_at 2026-04-18T12:55:00Z
1
value 0.00721
scoring_system epss
scoring_elements 0.72485
published_at 2026-04-09T12:55:00Z
2
value 0.00721
scoring_system epss
scoring_elements 0.72508
published_at 2026-04-11T12:55:00Z
3
value 0.00721
scoring_system epss
scoring_elements 0.7249
published_at 2026-04-12T12:55:00Z
4
value 0.00721
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-13T12:55:00Z
5
value 0.00721
scoring_system epss
scoring_elements 0.72522
published_at 2026-04-16T12:55:00Z
6
value 0.00721
scoring_system epss
scoring_elements 0.7244
published_at 2026-04-02T12:55:00Z
7
value 0.00721
scoring_system epss
scoring_elements 0.72458
published_at 2026-04-04T12:55:00Z
8
value 0.00721
scoring_system epss
scoring_elements 0.72434
published_at 2026-04-07T12:55:00Z
9
value 0.00721
scoring_system epss
scoring_elements 0.72472
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
reference_id 2297977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21147
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rggy-f3va-mfay
68
url VCID-shg1-t3nh-67hk
vulnerability_id VCID-shg1-t3nh-67hk
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21305
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45854
published_at 2026-04-02T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45875
published_at 2026-04-04T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45825
published_at 2026-04-07T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45881
published_at 2026-04-08T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45878
published_at 2026-04-09T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.459
published_at 2026-04-11T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.4587
published_at 2026-04-12T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45877
published_at 2026-04-13T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.4593
published_at 2026-04-16T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.45924
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21305
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041878
reference_id 2041878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041878
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21305
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shg1-t3nh-67hk
69
url VCID-t4r8-ujpb-5kdk
vulnerability_id VCID-t4r8-ujpb-5kdk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21541
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60711
published_at 2026-04-02T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60809
published_at 2026-04-18T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60741
published_at 2026-04-04T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60706
published_at 2026-04-07T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60755
published_at 2026-04-08T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.6077
published_at 2026-04-09T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60795
published_at 2026-04-11T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60781
published_at 2026-04-12T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-13T12:55:00Z
9
value 0.00401
scoring_system epss
scoring_elements 0.60804
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108543
reference_id 2108543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108543
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
reference_id H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
reference_id I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
reference_id JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
reference_id KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
reference_id L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
13
reference_url https://security.netapp.com/advisory/ntap-20220729-0009/
reference_id ntap-20220729-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://security.netapp.com/advisory/ntap-20220729-0009/
14
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
15
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
16
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
17
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
18
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
19
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
20
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
21
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
22
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
23
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
24
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
25
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
26
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
27
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
28
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
29
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
30
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
31
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
32
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
33
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
34
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
35
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
reference_id YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.4%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.4%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.4%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.4%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.4%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.4%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21541
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4r8-ujpb-5kdk
70
url VCID-tna8-m3b1-nkhn
vulnerability_id VCID-tna8-m3b1-nkhn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21291
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.32017
published_at 2026-04-02T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.32057
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32861
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-11T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32824
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32799
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32841
published_at 2026-04-16T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32818
published_at 2026-04-18T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32785
published_at 2026-04-07T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32832
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041831
reference_id 2041831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041831
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21291
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tna8-m3b1-nkhn
71
url VCID-tr4r-wm4s-auej
vulnerability_id VCID-tr4r-wm4s-auej
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21340
reference_id
reference_type
scores
0
value 0.06446
scoring_system epss
scoring_elements 0.91022
published_at 2026-04-02T12:55:00Z
1
value 0.06446
scoring_system epss
scoring_elements 0.91031
published_at 2026-04-04T12:55:00Z
2
value 0.06446
scoring_system epss
scoring_elements 0.9104
published_at 2026-04-07T12:55:00Z
3
value 0.06446
scoring_system epss
scoring_elements 0.91052
published_at 2026-04-08T12:55:00Z
4
value 0.06446
scoring_system epss
scoring_elements 0.91059
published_at 2026-04-09T12:55:00Z
5
value 0.06446
scoring_system epss
scoring_elements 0.91067
published_at 2026-04-13T12:55:00Z
6
value 0.06446
scoring_system epss
scoring_elements 0.91091
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041884
reference_id 2041884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041884
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21340
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tr4r-wm4s-auej
72
url VCID-u81s-cs95-4yhx
vulnerability_id VCID-u81s-cs95-4yhx
summary openjdk: Better TLS connection support (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21587
reference_id
reference_type
scores
0
value 0.00575
scoring_system epss
scoring_elements 0.687
published_at 2026-04-02T12:55:00Z
1
value 0.00575
scoring_system epss
scoring_elements 0.68798
published_at 2026-04-18T12:55:00Z
2
value 0.00575
scoring_system epss
scoring_elements 0.68775
published_at 2026-04-12T12:55:00Z
3
value 0.00575
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-13T12:55:00Z
4
value 0.00575
scoring_system epss
scoring_elements 0.68788
published_at 2026-04-16T12:55:00Z
5
value 0.00575
scoring_system epss
scoring_elements 0.68718
published_at 2026-04-04T12:55:00Z
6
value 0.00575
scoring_system epss
scoring_elements 0.68696
published_at 2026-04-07T12:55:00Z
7
value 0.00575
scoring_system epss
scoring_elements 0.68748
published_at 2026-04-08T12:55:00Z
8
value 0.00575
scoring_system epss
scoring_elements 0.68767
published_at 2026-04-09T12:55:00Z
9
value 0.00575
scoring_system epss
scoring_elements 0.68789
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21587
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359695
reference_id 2359695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359695
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-17T03:55:41Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://access.redhat.com/errata/RHSA-2025:8063
reference_id RHSA-2025:8063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8063
25
reference_url https://access.redhat.com/errata/RHSA-2025:8431
reference_id RHSA-2025:8431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8431
26
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
27
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
28
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
29
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
30
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
31
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
32
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-21587
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u81s-cs95-4yhx
73
url VCID-u9xe-x4f1-9fc8
vulnerability_id VCID-u9xe-x4f1-9fc8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2163
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26911
published_at 2026-04-01T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26775
published_at 2026-04-18T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2695
published_at 2026-04-02T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26986
published_at 2026-04-04T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26777
published_at 2026-04-07T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26846
published_at 2026-04-08T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26893
published_at 2026-04-09T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26896
published_at 2026-04-11T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26852
published_at 2026-04-12T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26795
published_at 2026-04-13T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26803
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2163
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951217
reference_id 1951217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951217
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
reference_id 5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
6
reference_url https://security.archlinux.org/AVG-1847
reference_id AVG-1847
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1847
7
reference_url https://security.archlinux.org/AVG-1848
reference_id AVG-1848
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1848
8
reference_url https://security.archlinux.org/AVG-1849
reference_id AVG-1849
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1849
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
reference_id CFXOKM2233JVGYDOWW77BN54X3GZTIBK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
reference_id CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
11
reference_url https://www.debian.org/security/2021/dsa-4899
reference_id dsa-4899
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://www.debian.org/security/2021/dsa-4899
12
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://security.gentoo.org/glsa/202209-05
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
reference_id MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
14
reference_url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
reference_id MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
16
reference_url https://security.netapp.com/advisory/ntap-20210513-0001/
reference_id ntap-20210513-0001
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://security.netapp.com/advisory/ntap-20210513-0001/
17
reference_url https://access.redhat.com/errata/RHSA-2021:1297
reference_id RHSA-2021:1297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1297
18
reference_url https://access.redhat.com/errata/RHSA-2021:1298
reference_id RHSA-2021:1298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1298
19
reference_url https://access.redhat.com/errata/RHSA-2021:1299
reference_id RHSA-2021:1299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1299
20
reference_url https://access.redhat.com/errata/RHSA-2021:1301
reference_id RHSA-2021:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1301
21
reference_url https://access.redhat.com/errata/RHSA-2021:1305
reference_id RHSA-2021:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1305
22
reference_url https://access.redhat.com/errata/RHSA-2021:1306
reference_id RHSA-2021:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1306
23
reference_url https://access.redhat.com/errata/RHSA-2021:1307
reference_id RHSA-2021:1307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1307
24
reference_url https://access.redhat.com/errata/RHSA-2021:1315
reference_id RHSA-2021:1315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1315
25
reference_url https://access.redhat.com/errata/RHSA-2021:1444
reference_id RHSA-2021:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1444
26
reference_url https://access.redhat.com/errata/RHSA-2021:1445
reference_id RHSA-2021:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1445
27
reference_url https://access.redhat.com/errata/RHSA-2021:1446
reference_id RHSA-2021:1446
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1446
28
reference_url https://access.redhat.com/errata/RHSA-2021:1447
reference_id RHSA-2021:1447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1447
29
reference_url https://access.redhat.com/errata/RHSA-2022:6735
reference_id RHSA-2022:6735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6735
30
reference_url https://access.redhat.com/errata/RHSA-2022:6755
reference_id RHSA-2022:6755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6755
31
reference_url https://access.redhat.com/errata/RHSA-2022:6756
reference_id RHSA-2022:6756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6756
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
reference_id UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
33
reference_url https://usn.ubuntu.com/4892-1/
reference_id USN-4892-1
reference_type
scores
url https://usn.ubuntu.com/4892-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17~19-1?distro=sid
purl pkg:deb/debian/openjdk-17@17~19-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17~19-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-2163
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9xe-x4f1-9fc8
74
url VCID-um54-6ggz-gqf9
vulnerability_id VCID-um54-6ggz-gqf9
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21628
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48077
published_at 2026-04-02T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48105
published_at 2026-04-13T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48094
published_at 2026-04-12T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48119
published_at 2026-04-11T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.48096
published_at 2026-04-09T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-08T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48098
published_at 2026-04-04T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48048
published_at 2026-04-07T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.60983
published_at 2026-04-18T12:55:00Z
9
value 0.00404
scoring_system epss
scoring_elements 0.60977
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133769
reference_id 2133769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133769
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
reference_id 37QDWJBGEPP65X43NXQTXQ7KASLUHON6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
reference_id 3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
reference_id 3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
reference_id EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
reference_id HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
18
reference_url https://security.netapp.com/advisory/ntap-20221028-0012/
reference_id ntap-20221028-0012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://security.netapp.com/advisory/ntap-20221028-0012/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
reference_id PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
20
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
21
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
22
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
23
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
24
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
25
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
26
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
27
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
28
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
29
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
30
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
31
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
32
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
33
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
34
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
35
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
36
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
37
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
38
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
39
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
40
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
41
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
42
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
43
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.5%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.5%252B8-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.6%2B10-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.6%252B10-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21628
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-um54-6ggz-gqf9
75
url VCID-vbw8-4j9f-eya5
vulnerability_id VCID-vbw8-4j9f-eya5
summary openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50106
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46067
published_at 2026-04-02T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46091
published_at 2026-04-08T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.46088
published_at 2026-04-04T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.46035
published_at 2026-04-07T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.46089
published_at 2026-04-09T12:55:00Z
5
value 0.00259
scoring_system epss
scoring_elements 0.49245
published_at 2026-04-13T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.49267
published_at 2026-04-11T12:55:00Z
7
value 0.00259
scoring_system epss
scoring_elements 0.4924
published_at 2026-04-12T12:55:00Z
8
value 0.00259
scoring_system epss
scoring_elements 0.49292
published_at 2026-04-16T12:55:00Z
9
value 0.00259
scoring_system epss
scoring_elements 0.49288
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379031
reference_id 2379031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379031
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:22:48Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
22
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
23
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
24
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
25
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
26
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
27
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
28
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.16%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.16%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.16%252B8-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-50106
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbw8-4j9f-eya5
76
url VCID-vpnc-yu7r-bqb6
vulnerability_id VCID-vpnc-yu7r-bqb6
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16975
published_at 2026-04-18T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17096
published_at 2026-04-12T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17036
published_at 2026-04-13T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16971
published_at 2026-04-16T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.1719
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-04T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17021
published_at 2026-04-07T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17111
published_at 2026-04-08T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.17169
published_at 2026-04-09T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17144
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
reference_id 2318526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.13%2B11-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.13%2B11-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.13%2B11-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-2~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21208
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpnc-yu7r-bqb6
77
url VCID-vuhe-re6z-8kax
vulnerability_id VCID-vuhe-re6z-8kax
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22025.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22025
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32344
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.3223
published_at 2026-04-18T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32207
published_at 2026-04-07T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32256
published_at 2026-04-08T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32285
published_at 2026-04-09T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32286
published_at 2026-04-11T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32248
published_at 2026-04-12T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32217
published_at 2026-04-13T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32251
published_at 2026-04-16T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32382
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243805
reference_id 2243805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243805
6
reference_url https://www.debian.org/security/2023/dsa-5548
reference_id dsa-5548
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:29Z/
url https://www.debian.org/security/2023/dsa-5548
7
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
8
reference_url https://security.netapp.com/advisory/ntap-20231027-0006/
reference_id ntap-20231027-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:29Z/
url https://security.netapp.com/advisory/ntap-20231027-0006/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
10
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
11
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
12
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
13
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
14
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
15
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
16
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
17
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
18
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
19
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.9%2B9-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.9%2B9-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.9%252B9-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.9%2B9-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.9%2B9-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.9%252B9-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.9%2B9-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.9%2B9-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.9%252B9-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-22025
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vuhe-re6z-8kax
78
url VCID-wn4r-ugaa-5ydb
vulnerability_id VCID-wn4r-ugaa-5ydb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46995
published_at 2026-04-18T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46888
published_at 2026-04-07T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46942
published_at 2026-04-08T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46939
published_at 2026-04-09T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46963
published_at 2026-04-11T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46936
published_at 2026-04-12T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46944
published_at 2026-04-13T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46999
published_at 2026-04-16T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46923
published_at 2026-04-02T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.4694
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
reference_id 2257728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.10%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.10%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-20918
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wn4r-ugaa-5ydb
79
url VCID-ws4h-edpn-nudd
vulnerability_id VCID-ws4h-edpn-nudd
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21299
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26898
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26933
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2672
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26789
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26841
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26796
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26739
published_at 2026-04-13T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26747
published_at 2026-04-16T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26719
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21299
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041472
reference_id 2041472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041472
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:4918
reference_id RHSA-2022:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4918
38
reference_url https://access.redhat.com/errata/RHSA-2022:4919
reference_id RHSA-2022:4919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4919
39
reference_url https://access.redhat.com/errata/RHSA-2022:4922
reference_id RHSA-2022:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4922
40
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
41
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21299
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-edpn-nudd
80
url VCID-x4ms-sbj7-aufu
vulnerability_id VCID-x4ms-sbj7-aufu
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22006.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22006
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35272
published_at 2026-04-02T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.353
published_at 2026-04-04T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35182
published_at 2026-04-07T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35226
published_at 2026-04-08T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35251
published_at 2026-04-09T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35255
published_at 2026-04-11T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3522
published_at 2026-04-12T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35196
published_at 2026-04-13T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35235
published_at 2026-04-16T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35221
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2221626
reference_id 2221626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2221626
16
reference_url https://security.gentoo.org/glsa/202407-24
reference_id GLSA-202407-24
reference_type
scores
url https://security.gentoo.org/glsa/202407-24
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2023:4157
reference_id RHSA-2023:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4157
19
reference_url https://access.redhat.com/errata/RHSA-2023:4158
reference_id RHSA-2023:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4158
20
reference_url https://access.redhat.com/errata/RHSA-2023:4159
reference_id RHSA-2023:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4159
21
reference_url https://access.redhat.com/errata/RHSA-2023:4161
reference_id RHSA-2023:4161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4161
22
reference_url https://access.redhat.com/errata/RHSA-2023:4162
reference_id RHSA-2023:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4162
23
reference_url https://access.redhat.com/errata/RHSA-2023:4163
reference_id RHSA-2023:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4163
24
reference_url https://access.redhat.com/errata/RHSA-2023:4164
reference_id RHSA-2023:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4164
25
reference_url https://access.redhat.com/errata/RHSA-2023:4165
reference_id RHSA-2023:4165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4165
26
reference_url https://access.redhat.com/errata/RHSA-2023:4169
reference_id RHSA-2023:4169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4169
27
reference_url https://access.redhat.com/errata/RHSA-2023:4170
reference_id RHSA-2023:4170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4170
28
reference_url https://access.redhat.com/errata/RHSA-2023:4171
reference_id RHSA-2023:4171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4171
29
reference_url https://access.redhat.com/errata/RHSA-2023:4175
reference_id RHSA-2023:4175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4175
30
reference_url https://access.redhat.com/errata/RHSA-2023:4177
reference_id RHSA-2023:4177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4177
31
reference_url https://access.redhat.com/errata/RHSA-2023:4208
reference_id RHSA-2023:4208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4208
32
reference_url https://access.redhat.com/errata/RHSA-2023:4210
reference_id RHSA-2023:4210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4210
33
reference_url https://access.redhat.com/errata/RHSA-2023:4211
reference_id RHSA-2023:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4211
34
reference_url https://access.redhat.com/errata/RHSA-2023:4233
reference_id RHSA-2023:4233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4233
35
reference_url https://usn.ubuntu.com/6263-1/
reference_id USN-6263-1
reference_type
scores
url https://usn.ubuntu.com/6263-1/
36
reference_url https://usn.ubuntu.com/6272-1/
reference_id USN-6272-1
reference_type
scores
url https://usn.ubuntu.com/6272-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1~deb12u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.8%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.8%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-22006
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4ms-sbj7-aufu
81
url VCID-xfqx-d3jw-yuhn
vulnerability_id VCID-xfqx-d3jw-yuhn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21248
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24337
published_at 2026-04-02T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24183
published_at 2026-04-18T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2437
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24153
published_at 2026-04-07T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-08T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24263
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2428
published_at 2026-04-11T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24237
published_at 2026-04-12T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.2418
published_at 2026-04-13T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24196
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21248
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041801
reference_id 2041801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041801
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
reference_id 2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
reference_id 4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
21
reference_url https://www.debian.org/security/2022/dsa-5057
reference_id dsa-5057
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://www.debian.org/security/2022/dsa-5057
22
reference_url https://www.debian.org/security/2022/dsa-5058
reference_id dsa-5058
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://www.debian.org/security/2022/dsa-5058
23
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://security.gentoo.org/glsa/202209-05
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
reference_id KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
25
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
26
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
27
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
28
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
29
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
30
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
31
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
32
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
33
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
34
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
35
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
36
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
37
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
38
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
39
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
40
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
41
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
42
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
43
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
44
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
45
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
46
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
47
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21248
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqx-d3jw-yuhn
82
url VCID-xk2v-7cgk-13ex
vulnerability_id VCID-xk2v-7cgk-13ex
summary OpenJDK: certificate validation issue in TLS session negotiation (8298310)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21967.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21967
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.2175
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21613
published_at 2026-04-18T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21805
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21556
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21633
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21691
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21702
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21664
published_at 2026-04-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21607
published_at 2026-04-13T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21605
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21967
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
reference_id 1035957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
reference_id 1036280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2187704
reference_id 2187704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2187704
18
reference_url https://www.debian.org/security/2023/dsa-5430
reference_id dsa-5430
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/
url https://www.debian.org/security/2023/dsa-5430
19
reference_url https://www.debian.org/security/2023/dsa-5478
reference_id dsa-5478
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/
url https://www.debian.org/security/2023/dsa-5478
20
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
21
reference_url https://security.netapp.com/advisory/ntap-20230427-0008/
reference_id ntap-20230427-0008
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/
url https://security.netapp.com/advisory/ntap-20230427-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2023:1875
reference_id RHSA-2023:1875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1875
23
reference_url https://access.redhat.com/errata/RHSA-2023:1877
reference_id RHSA-2023:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1877
24
reference_url https://access.redhat.com/errata/RHSA-2023:1878
reference_id RHSA-2023:1878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1878
25
reference_url https://access.redhat.com/errata/RHSA-2023:1879
reference_id RHSA-2023:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1879
26
reference_url https://access.redhat.com/errata/RHSA-2023:1880
reference_id RHSA-2023:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1880
27
reference_url https://access.redhat.com/errata/RHSA-2023:1882
reference_id RHSA-2023:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1882
28
reference_url https://access.redhat.com/errata/RHSA-2023:1883
reference_id RHSA-2023:1883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1883
29
reference_url https://access.redhat.com/errata/RHSA-2023:1884
reference_id RHSA-2023:1884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1884
30
reference_url https://access.redhat.com/errata/RHSA-2023:1885
reference_id RHSA-2023:1885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1885
31
reference_url https://access.redhat.com/errata/RHSA-2023:1889
reference_id RHSA-2023:1889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1889
32
reference_url https://access.redhat.com/errata/RHSA-2023:1890
reference_id RHSA-2023:1890
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1890
33
reference_url https://access.redhat.com/errata/RHSA-2023:1891
reference_id RHSA-2023:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1891
34
reference_url https://access.redhat.com/errata/RHSA-2023:1892
reference_id RHSA-2023:1892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1892
35
reference_url https://access.redhat.com/errata/RHSA-2023:1895
reference_id RHSA-2023:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1895
36
reference_url https://access.redhat.com/errata/RHSA-2023:1898
reference_id RHSA-2023:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1898
37
reference_url https://access.redhat.com/errata/RHSA-2023:1899
reference_id RHSA-2023:1899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1899
38
reference_url https://access.redhat.com/errata/RHSA-2023:1900
reference_id RHSA-2023:1900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1900
39
reference_url https://access.redhat.com/errata/RHSA-2023:1903
reference_id RHSA-2023:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1903
40
reference_url https://access.redhat.com/errata/RHSA-2023:1904
reference_id RHSA-2023:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1904
41
reference_url https://access.redhat.com/errata/RHSA-2023:1905
reference_id RHSA-2023:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1905
42
reference_url https://access.redhat.com/errata/RHSA-2023:1906
reference_id RHSA-2023:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1906
43
reference_url https://access.redhat.com/errata/RHSA-2023:1907
reference_id RHSA-2023:1907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1907
44
reference_url https://access.redhat.com/errata/RHSA-2023:1908
reference_id RHSA-2023:1908
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1908
45
reference_url https://access.redhat.com/errata/RHSA-2023:1909
reference_id RHSA-2023:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1909
46
reference_url https://access.redhat.com/errata/RHSA-2023:1910
reference_id RHSA-2023:1910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1910
47
reference_url https://access.redhat.com/errata/RHSA-2023:1911
reference_id RHSA-2023:1911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1911
48
reference_url https://access.redhat.com/errata/RHSA-2023:1912
reference_id RHSA-2023:1912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1912
49
reference_url https://access.redhat.com/errata/RHSA-2023:4103
reference_id RHSA-2023:4103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4103
50
reference_url https://access.redhat.com/errata/RHSA-2023:4160
reference_id RHSA-2023:4160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4160
51
reference_url https://usn.ubuntu.com/6077-1/
reference_id USN-6077-1
reference_type
scores
url https://usn.ubuntu.com/6077-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.7%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.7%252B7-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2023-21967
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xk2v-7cgk-13ex
83
url VCID-y5qu-j3wt-wuej
vulnerability_id VCID-y5qu-j3wt-wuej
summary OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21496
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29352
published_at 2026-04-04T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29178
published_at 2026-04-18T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29203
published_at 2026-04-16T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29176
published_at 2026-04-13T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29229
published_at 2026-04-12T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29275
published_at 2026-04-11T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29269
published_at 2026-04-09T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29228
published_at 2026-04-08T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29164
published_at 2026-04-07T12:55:00Z
9
value 0.00109
scoring_system epss
scoring_elements 0.29303
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075849
reference_id 2075849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075849
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21496
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5qu-j3wt-wuej
84
url VCID-y8bc-k5qu-c7f5
vulnerability_id VCID-y8bc-k5qu-c7f5
summary openjdk: Improve compiler transformations (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30691
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-02T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58846
published_at 2026-04-16T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58833
published_at 2026-04-12T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58851
published_at 2026-04-18T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58814
published_at 2026-04-13T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-04T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58775
published_at 2026-04-07T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58827
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359694
reference_id 2359694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359694
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:24:18Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
25
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
26
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
27
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
28
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
29
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
30
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.15%2B6-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.15%2B6-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.15%252B6-1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2025-30691
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8bc-k5qu-c7f5
85
url VCID-yxk8-59zb-y7g2
vulnerability_id VCID-yxk8-59zb-y7g2
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35578
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34514
published_at 2026-04-01T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34671
published_at 2026-04-18T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34685
published_at 2026-04-16T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-09T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
10
value 0.00144
scoring_system epss
scoring_elements 0.34635
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35578
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015653
reference_id 2015653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015653
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
41
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
42
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.1%2B12-1%2Bdeb11u2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.1%252B12-1%252Bdeb11u2%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2021-35578
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxk8-59zb-y7g2
86
url VCID-z356-tw9t-q7bp
vulnerability_id VCID-z356-tw9t-q7bp
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34671
published_at 2026-04-18T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34685
published_at 2026-04-16T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34636
published_at 2026-04-07T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34708
published_at 2026-04-09T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
reference_id 2318524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
12
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
13
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
14
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
15
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
16
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
17
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
18
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
19
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
20
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
21
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
22
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
23
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
24
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
25
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
26
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
27
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
28
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
29
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
30
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
31
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
32
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
33
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
34
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.13%2B11-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.13%2B11-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.13%2B11-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.13%2B11-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.13%252B11-2~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21210
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z356-tw9t-q7bp
87
url VCID-zdra-bzqn-4ug9
vulnerability_id VCID-zdra-bzqn-4ug9
summary OpenJDK: integer overflow in C1 compiler address generation (8322122)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.6765
published_at 2026-04-16T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-04T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67575
published_at 2026-04-07T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67627
published_at 2026-04-08T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.6764
published_at 2026-04-09T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.67663
published_at 2026-04-18T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-12T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-13T12:55:00Z
8
value 0.0054
scoring_system epss
scoring_elements 0.67576
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
reference_id 2275003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
19
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
21
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
22
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
23
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
24
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
25
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
26
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
27
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
28
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
29
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
30
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
31
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
32
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
33
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
34
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
35
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
36
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
37
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
38
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
39
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
40
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1~deb12u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.11%2B9-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.11%2B9-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.11%252B9-1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
7
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21068
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdra-bzqn-4ug9
88
url VCID-zgpr-3zft-zqgt
vulnerability_id VCID-zgpr-3zft-zqgt
summary OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68579
published_at 2026-04-18T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68543
published_at 2026-04-09T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68569
published_at 2026-04-11T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68556
published_at 2026-04-12T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-13T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.68566
published_at 2026-04-16T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68479
published_at 2026-04-02T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68498
published_at 2026-04-04T12:55:00Z
8
value 0.00568
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-07T12:55:00Z
9
value 0.00568
scoring_system epss
scoring_elements 0.68525
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
reference_id 2297963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb12u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2024-21140
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgpr-3zft-zqgt
89
url VCID-zh9v-47ue-p7ep
vulnerability_id VCID-zh9v-47ue-p7ep
summary OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21434
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.2904
published_at 2026-04-12T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.2911
published_at 2026-04-02T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.28992
published_at 2026-04-18T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29014
published_at 2026-04-16T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.2899
published_at 2026-04-13T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29161
published_at 2026-04-04T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.28972
published_at 2026-04-07T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29036
published_at 2026-04-08T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29078
published_at 2026-04-09T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29084
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075836
reference_id 2075836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075836
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.3%2B7-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.3%252B7-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21434
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zh9v-47ue-p7ep
90
url VCID-ztx2-xh6v-nke1
vulnerability_id VCID-ztx2-xh6v-nke1
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21277
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37445
published_at 2026-04-02T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.3747
published_at 2026-04-04T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75391
published_at 2026-04-09T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-11T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-12T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75378
published_at 2026-04-13T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.7542
published_at 2026-04-16T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75426
published_at 2026-04-18T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-07T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041479
reference_id 2041479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041479
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
0
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1~deb11u1%3Fdistro=sid
1
url pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.2%2B8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.2%252B8-1%3Fdistro=sid
2
url pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.12%2B7-2~deb11u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.12%252B7-2~deb11u1%3Fdistro=sid
3
url pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.17%2B10-1~deb12u1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.17%252B10-1~deb12u1%3Fdistro=sid
4
url pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~6ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~6ea-1%3Fdistro=sid
5
url pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-1%3Fdistro=sid
6
url pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
purl pkg:deb/debian/openjdk-17@17.0.19~9ea-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid
aliases CVE-2022-21277
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztx2-xh6v-nke1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-17@17.0.19~9ea-2%3Fdistro=sid