Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
Typedeb
Namespacedebian
Nameopenjdk-21
Version21.0.11+10-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-11vj-5zz4-6fe7
vulnerability_id VCID-11vj-5zz4-6fe7
summary openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30698
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69565
published_at 2026-04-02T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69703
published_at 2026-04-24T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69661
published_at 2026-04-16T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.6967
published_at 2026-04-18T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69651
published_at 2026-04-21T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69581
published_at 2026-04-04T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.6956
published_at 2026-04-07T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69611
published_at 2026-04-08T12:55:00Z
8
value 0.00605
scoring_system epss
scoring_elements 0.69627
published_at 2026-04-09T12:55:00Z
9
value 0.00605
scoring_system epss
scoring_elements 0.6965
published_at 2026-04-11T12:55:00Z
10
value 0.00605
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-12T12:55:00Z
11
value 0.00605
scoring_system epss
scoring_elements 0.69621
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359693
reference_id 2359693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359693
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:13:36Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://access.redhat.com/errata/RHSA-2025:8063
reference_id RHSA-2025:8063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8063
25
reference_url https://access.redhat.com/errata/RHSA-2025:8431
reference_id RHSA-2025:8431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8431
26
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
27
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
28
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
29
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
30
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
31
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
32
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.7%252B6-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-30698
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11vj-5zz4-6fe7
1
url VCID-13t7-vubq-8kae
vulnerability_id VCID-13t7-vubq-8kae
summary openjdk: Enhance certificate handling (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53057
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18209
published_at 2026-04-21T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-24T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22702
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22587
published_at 2026-04-13T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22602
published_at 2026-04-16T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22599
published_at 2026-04-18T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22747
published_at 2026-04-04T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22535
published_at 2026-04-07T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22612
published_at 2026-04-08T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22666
published_at 2026-04-09T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22683
published_at 2026-04-11T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22642
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53057
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
reference_id 1118944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403082
reference_id 2403082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403082
6
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T14:46:38Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:18814
reference_id RHSA-2025:18814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18814
8
reference_url https://access.redhat.com/errata/RHSA-2025:18815
reference_id RHSA-2025:18815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18815
9
reference_url https://access.redhat.com/errata/RHSA-2025:18816
reference_id RHSA-2025:18816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18816
10
reference_url https://access.redhat.com/errata/RHSA-2025:18817
reference_id RHSA-2025:18817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18817
11
reference_url https://access.redhat.com/errata/RHSA-2025:18818
reference_id RHSA-2025:18818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18818
12
reference_url https://access.redhat.com/errata/RHSA-2025:18819
reference_id RHSA-2025:18819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18819
13
reference_url https://access.redhat.com/errata/RHSA-2025:18820
reference_id RHSA-2025:18820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18820
14
reference_url https://access.redhat.com/errata/RHSA-2025:18821
reference_id RHSA-2025:18821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18821
15
reference_url https://access.redhat.com/errata/RHSA-2025:18822
reference_id RHSA-2025:18822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18822
16
reference_url https://access.redhat.com/errata/RHSA-2025:18823
reference_id RHSA-2025:18823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18823
17
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
18
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
19
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
20
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
21
reference_url https://access.redhat.com/errata/RHSA-2025:22370
reference_id RHSA-2025:22370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22370
22
reference_url https://access.redhat.com/errata/RHSA-2025:22672
reference_id RHSA-2025:22672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22672
23
reference_url https://usn.ubuntu.com/7881-1/
reference_id USN-7881-1
reference_type
scores
url https://usn.ubuntu.com/7881-1/
24
reference_url https://usn.ubuntu.com/7882-1/
reference_id USN-7882-1
reference_type
scores
url https://usn.ubuntu.com/7882-1/
25
reference_url https://usn.ubuntu.com/7883-1/
reference_id USN-7883-1
reference_type
scores
url https://usn.ubuntu.com/7883-1/
26
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
27
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
28
reference_url https://usn.ubuntu.com/7900-1/
reference_id USN-7900-1
reference_type
scores
url https://usn.ubuntu.com/7900-1/
29
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
30
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
7
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-53057
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13t7-vubq-8kae
2
url VCID-1gha-995s-7qdg
vulnerability_id VCID-1gha-995s-7qdg
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22016.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22016.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22016
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09722
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22016
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460039
reference_id 2460039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460039
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:11:15Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
8
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
9
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
10
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
11
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
12
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
13
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
14
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
15
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
16
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
17
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
18
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-22016
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1gha-995s-7qdg
3
url VCID-2tju-1r8k-sbf9
vulnerability_id VCID-2tju-1r8k-sbf9
summary OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.61781
published_at 2026-04-24T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.61766
published_at 2026-04-09T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.61787
published_at 2026-04-11T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61775
published_at 2026-04-12T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.61756
published_at 2026-04-13T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61798
published_at 2026-04-16T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61803
published_at 2026-04-18T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61786
published_at 2026-04-21T12:55:00Z
8
value 0.00417
scoring_system epss
scoring_elements 0.617
published_at 2026-04-02T12:55:00Z
9
value 0.00417
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-04T12:55:00Z
10
value 0.00417
scoring_system epss
scoring_elements 0.61701
published_at 2026-04-07T12:55:00Z
11
value 0.00417
scoring_system epss
scoring_elements 0.6175
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21094
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
reference_id 2275005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275005
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
25
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
26
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
27
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
28
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
29
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
30
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
31
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
32
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
33
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
34
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
35
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
36
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
37
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
38
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
39
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
40
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
41
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
42
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
43
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21094
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tju-1r8k-sbf9
4
url VCID-3tav-ffar-hfhb
vulnerability_id VCID-3tav-ffar-hfhb
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28122
published_at 2026-04-24T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28209
published_at 2026-04-21T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-02T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30658
published_at 2026-04-11T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30613
published_at 2026-04-12T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30566
published_at 2026-04-13T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30591
published_at 2026-04-16T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30573
published_at 2026-04-18T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.3075
published_at 2026-04-04T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30561
published_at 2026-04-07T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30619
published_at 2026-04-08T12:55:00Z
11
value 0.00117
scoring_system epss
scoring_elements 0.30653
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
reference_id 2160475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0203
reference_id RHSA-2023:0203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0203
27
reference_url https://access.redhat.com/errata/RHSA-2023:0204
reference_id RHSA-2023:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0204
28
reference_url https://access.redhat.com/errata/RHSA-2023:0205
reference_id RHSA-2023:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0205
29
reference_url https://access.redhat.com/errata/RHSA-2023:0206
reference_id RHSA-2023:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0206
30
reference_url https://access.redhat.com/errata/RHSA-2023:0207
reference_id RHSA-2023:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0207
31
reference_url https://access.redhat.com/errata/RHSA-2023:0208
reference_id RHSA-2023:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0208
32
reference_url https://access.redhat.com/errata/RHSA-2023:0209
reference_id RHSA-2023:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0209
33
reference_url https://access.redhat.com/errata/RHSA-2023:0210
reference_id RHSA-2023:0210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0210
34
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
35
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
36
reference_url https://access.redhat.com/errata/RHSA-2023:0354
reference_id RHSA-2023:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0354
37
reference_url https://access.redhat.com/errata/RHSA-2023:0387
reference_id RHSA-2023:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0387
38
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
39
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
40
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
41
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
42
reference_url https://usn.ubuntu.com/5898-1/
reference_id USN-5898-1
reference_type
scores
url https://usn.ubuntu.com/5898-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21~7ea-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2023-21843
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tav-ffar-hfhb
5
url VCID-4snj-etwf-eqe8
vulnerability_id VCID-4snj-etwf-eqe8
summary openjdk: Improve HttpServer Request handling (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21933
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09035
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09147
published_at 2026-04-24T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.08972
published_at 2026-04-16T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.08951
published_at 2026-04-18T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09105
published_at 2026-04-21T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09086
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.0901
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0909
published_at 2026-04-08T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09121
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09122
published_at 2026-04-11T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09091
published_at 2026-04-12T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09077
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429926
reference_id 2429926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429926
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:56:13Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-21933
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4snj-etwf-eqe8
6
url VCID-57sd-8y93-qqhu
vulnerability_id VCID-57sd-8y93-qqhu
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34282.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34282
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.121
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34282
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34282
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460044
reference_id 2460044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460044
5
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T15:33:23Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
6
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
7
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
8
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
9
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
10
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
11
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
12
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
13
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
14
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-34282
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57sd-8y93-qqhu
7
url VCID-5et1-ytak-xqh7
vulnerability_id VCID-5et1-ytak-xqh7
summary OpenJDK: Excessive symbol length can lead to infinite loop (8319859)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.561
published_at 2026-04-24T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56186
published_at 2026-04-12T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.5617
published_at 2026-04-13T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56203
published_at 2026-04-16T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.56205
published_at 2026-04-18T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56175
published_at 2026-04-21T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56144
published_at 2026-04-07T12:55:00Z
7
value 0.00333
scoring_system epss
scoring_elements 0.56165
published_at 2026-04-04T12:55:00Z
8
value 0.00333
scoring_system epss
scoring_elements 0.56195
published_at 2026-04-08T12:55:00Z
9
value 0.00333
scoring_system epss
scoring_elements 0.56201
published_at 2026-04-09T12:55:00Z
10
value 0.00333
scoring_system epss
scoring_elements 0.5621
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21138
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
reference_id 2297962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297962
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21138
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5et1-ytak-xqh7
8
url VCID-6196-gvhx-ruh8
vulnerability_id VCID-6196-gvhx-ruh8
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38363
published_at 2026-04-09T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38417
published_at 2026-04-02T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38441
published_at 2026-04-04T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38305
published_at 2026-04-07T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38355
published_at 2026-04-08T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.3838
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44139
published_at 2026-04-21T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44159
published_at 2026-04-13T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.4422
published_at 2026-04-16T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.4421
published_at 2026-04-18T12:55:00Z
10
value 0.00216
scoring_system epss
scoring_elements 0.44063
published_at 2026-04-24T12:55:00Z
11
value 0.00216
scoring_system epss
scoring_elements 0.44158
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
reference_id 2318534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318534
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.5%252B11-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21235
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6196-gvhx-ruh8
9
url VCID-6fce-bys3-kkgm
vulnerability_id VCID-6fce-bys3-kkgm
summary openjdk: OpenJDK: Update LibPNG (Oracle CPU 2026-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22020.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22020.json
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460045
reference_id 2460045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460045
fixed_packages
0
url pkg:deb/debian/openjdk-21@0?distro=trixie
purl pkg:deb/debian/openjdk-21@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@0%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-22020
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fce-bys3-kkgm
10
url VCID-6r1k-8y1c-q7fm
vulnerability_id VCID-6r1k-8y1c-q7fm
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22007.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22007
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01704
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22007
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460038
reference_id 2460038
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460038
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:05:16Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
8
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
9
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
10
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
11
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
12
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
13
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
14
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
15
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
16
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
17
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
18
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-22007
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6r1k-8y1c-q7fm
11
url VCID-76rb-sg3r-bqce
vulnerability_id VCID-76rb-sg3r-bqce
summary OpenJDK: potential UTF8 size overflow (8314794)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63328
published_at 2026-04-24T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63338
published_at 2026-04-11T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-16T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63286
published_at 2026-04-13T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.6333
published_at 2026-04-18T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63309
published_at 2026-04-21T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63258
published_at 2026-04-02T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.63287
published_at 2026-04-04T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63252
published_at 2026-04-07T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63303
published_at 2026-04-08T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.63321
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21131
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
reference_id 2297961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297961
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21131
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76rb-sg3r-bqce
12
url VCID-8cup-qnc8-wudx
vulnerability_id VCID-8cup-qnc8-wudx
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55409
published_at 2026-04-24T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-09T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55505
published_at 2026-04-11T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55483
published_at 2026-04-12T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55466
published_at 2026-04-13T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55503
published_at 2026-04-16T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55506
published_at 2026-04-18T12:55:00Z
7
value 0.00324
scoring_system epss
scoring_elements 0.55485
published_at 2026-04-21T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55441
published_at 2026-04-02T12:55:00Z
9
value 0.00324
scoring_system epss
scoring_elements 0.55465
published_at 2026-04-04T12:55:00Z
10
value 0.00324
scoring_system epss
scoring_elements 0.55444
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
reference_id 2257837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257837
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-20952
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cup-qnc8-wudx
13
url VCID-9n5v-4daz-eyc2
vulnerability_id VCID-9n5v-4daz-eyc2
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26493
published_at 2026-04-24T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26618
published_at 2026-04-16T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26589
published_at 2026-04-18T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26551
published_at 2026-04-21T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26767
published_at 2026-04-02T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26807
published_at 2026-04-04T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26591
published_at 2026-04-07T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26658
published_at 2026-04-08T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-09T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-11T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26668
published_at 2026-04-12T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26611
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
reference_id 2318530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318530
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.5%252B11-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21217
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5v-4daz-eyc2
14
url VCID-9urr-3gt2-mfhe
vulnerability_id VCID-9urr-3gt2-mfhe
summary OpenJDK: long Exception message leading to crash (8319851)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.56641
published_at 2026-04-24T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-09T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-11T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56721
published_at 2026-04-12T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.567
published_at 2026-04-13T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56731
published_at 2026-04-16T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56729
published_at 2026-04-18T12:55:00Z
7
value 0.00339
scoring_system epss
scoring_elements 0.56702
published_at 2026-04-21T12:55:00Z
8
value 0.00339
scoring_system epss
scoring_elements 0.5668
published_at 2026-04-07T12:55:00Z
9
value 0.00339
scoring_system epss
scoring_elements 0.56701
published_at 2026-04-04T12:55:00Z
10
value 0.00339
scoring_system epss
scoring_elements 0.56732
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
reference_id 2274977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274977
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
21
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
22
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
23
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
24
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
25
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
26
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
27
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
28
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
29
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
30
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
31
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
32
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
33
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
34
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
35
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
36
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
37
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
38
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
39
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
40
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
41
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21011
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9urr-3gt2-mfhe
15
url VCID-a282-ksr4-j3cu
vulnerability_id VCID-a282-ksr4-j3cu
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26809
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26849
published_at 2026-04-04T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26634
published_at 2026-04-07T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26702
published_at 2026-04-08T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26753
published_at 2026-04-09T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26756
published_at 2026-04-11T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26712
published_at 2026-04-12T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26655
published_at 2026-04-13T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26664
published_at 2026-04-16T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26636
published_at 2026-04-18T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26599
published_at 2026-04-21T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.2654
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
reference_id 2243627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243627
6
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
7
reference_url https://access.redhat.com/errata/RHSA-2023:5725
reference_id RHSA-2023:5725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5725
8
reference_url https://access.redhat.com/errata/RHSA-2023:5726
reference_id RHSA-2023:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5726
9
reference_url https://access.redhat.com/errata/RHSA-2023:5727
reference_id RHSA-2023:5727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5727
10
reference_url https://access.redhat.com/errata/RHSA-2023:5728
reference_id RHSA-2023:5728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5728
11
reference_url https://access.redhat.com/errata/RHSA-2023:5729
reference_id RHSA-2023:5729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5729
12
reference_url https://access.redhat.com/errata/RHSA-2023:5730
reference_id RHSA-2023:5730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5730
13
reference_url https://access.redhat.com/errata/RHSA-2023:5731
reference_id RHSA-2023:5731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5731
14
reference_url https://access.redhat.com/errata/RHSA-2023:5732
reference_id RHSA-2023:5732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5732
15
reference_url https://access.redhat.com/errata/RHSA-2023:5733
reference_id RHSA-2023:5733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5733
16
reference_url https://access.redhat.com/errata/RHSA-2023:5734
reference_id RHSA-2023:5734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5734
17
reference_url https://access.redhat.com/errata/RHSA-2023:5735
reference_id RHSA-2023:5735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5735
18
reference_url https://access.redhat.com/errata/RHSA-2023:5736
reference_id RHSA-2023:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5736
19
reference_url https://access.redhat.com/errata/RHSA-2023:5737
reference_id RHSA-2023:5737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5737
20
reference_url https://access.redhat.com/errata/RHSA-2023:5739
reference_id RHSA-2023:5739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5739
21
reference_url https://access.redhat.com/errata/RHSA-2023:5740
reference_id RHSA-2023:5740
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5740
22
reference_url https://access.redhat.com/errata/RHSA-2023:5741
reference_id RHSA-2023:5741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5741
23
reference_url https://access.redhat.com/errata/RHSA-2023:5742
reference_id RHSA-2023:5742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5742
24
reference_url https://access.redhat.com/errata/RHSA-2023:5743
reference_id RHSA-2023:5743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5743
25
reference_url https://access.redhat.com/errata/RHSA-2023:5744
reference_id RHSA-2023:5744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5744
26
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
27
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
28
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
29
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
30
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
31
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
32
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
33
reference_url https://access.redhat.com/errata/RHSA-2023:5761
reference_id RHSA-2023:5761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5761
34
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
35
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
36
reference_url https://access.redhat.com/errata/RHSA-2024:0866
reference_id RHSA-2024:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0866
37
reference_url https://access.redhat.com/errata/RHSA-2024:0879
reference_id RHSA-2024:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0879
38
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
39
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.1%2B12-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.1%2B12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.1%252B12-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2023-22081
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a282-ksr4-j3cu
16
url VCID-a3xk-3wya-s3gm
vulnerability_id VCID-a3xk-3wya-s3gm
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15345
published_at 2026-04-24T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15304
published_at 2026-04-21T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-02T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-07T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23112
published_at 2026-04-08T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23165
published_at 2026-04-09T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23185
published_at 2026-04-11T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23147
published_at 2026-04-12T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23089
published_at 2026-04-13T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23104
published_at 2026-04-16T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23096
published_at 2026-04-18T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.2325
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
reference_id 2160421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
27
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
28
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
29
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
30
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21~7ea-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2023-21835
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3xk-3wya-s3gm
17
url VCID-apsn-z1br-3bdy
vulnerability_id VCID-apsn-z1br-3bdy
summary openjdk: Enhance Certificate Checking (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21945
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16874
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16615
published_at 2026-04-24T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16664
published_at 2026-04-16T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16672
published_at 2026-04-18T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16709
published_at 2026-04-21T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1693
published_at 2026-04-04T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16714
published_at 2026-04-07T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16799
published_at 2026-04-08T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16854
published_at 2026-04-09T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16832
published_at 2026-04-11T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16786
published_at 2026-04-12T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16728
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429927
reference_id 2429927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429927
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:04:39Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-21945
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apsn-z1br-3bdy
18
url VCID-b32x-4pu4-jkh4
vulnerability_id VCID-b32x-4pu4-jkh4
summary openjdk: Better Glyph drawing (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30749
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.6625
published_at 2026-04-02T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66307
published_at 2026-04-09T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66277
published_at 2026-04-04T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66247
published_at 2026-04-07T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66294
published_at 2026-04-08T12:55:00Z
5
value 0.00521
scoring_system epss
scoring_elements 0.66893
published_at 2026-04-21T12:55:00Z
6
value 0.00672
scoring_system epss
scoring_elements 0.71439
published_at 2026-04-24T12:55:00Z
7
value 0.00672
scoring_system epss
scoring_elements 0.71388
published_at 2026-04-11T12:55:00Z
8
value 0.00672
scoring_system epss
scoring_elements 0.71372
published_at 2026-04-12T12:55:00Z
9
value 0.00672
scoring_system epss
scoring_elements 0.71355
published_at 2026-04-13T12:55:00Z
10
value 0.00672
scoring_system epss
scoring_elements 0.71401
published_at 2026-04-16T12:55:00Z
11
value 0.00672
scoring_system epss
scoring_elements 0.71407
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376783
reference_id 2376783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376783
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:23:21Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
22
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
23
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
24
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
25
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
26
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
27
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
28
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.8%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-30749
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b32x-4pu4-jkh4
19
url VCID-duy9-6f1p-vqah
vulnerability_id VCID-duy9-6f1p-vqah
summary openjdk: Enhance Handling of URIs (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21932
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09259
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09406
published_at 2026-04-24T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09205
published_at 2026-04-16T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09204
published_at 2026-04-18T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09355
published_at 2026-04-21T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0931
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09227
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09302
published_at 2026-04-08T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09346
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09356
published_at 2026-04-11T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09328
published_at 2026-04-12T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09314
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429925
reference_id 2429925
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429925
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:55:36Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
8
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
9
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
10
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
11
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
12
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
13
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
14
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
15
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
16
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
17
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
18
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
19
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-21932
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duy9-6f1p-vqah
20
url VCID-e6dm-6767-9kdk
vulnerability_id VCID-e6dm-6767-9kdk
summary openjdk: Improve HTTP client header handling (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32274
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32212
published_at 2026-04-09T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32311
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32136
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32185
published_at 2026-04-08T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32619
published_at 2026-04-18T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32433
published_at 2026-04-24T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32603
published_at 2026-04-13T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32641
published_at 2026-04-16T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32589
published_at 2026-04-21T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32669
published_at 2026-04-11T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32631
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50059
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
reference_id 2376785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376785
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:42:42Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
7
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
8
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
9
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
10
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
11
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
12
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
13
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
14
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
15
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
16
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
17
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
18
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
19
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
20
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
21
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
22
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.8%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-50059
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6dm-6767-9kdk
21
url VCID-ecr4-rqud-gyhf
vulnerability_id VCID-ecr4-rqud-gyhf
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21830.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21830
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.3205
published_at 2026-04-02T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.3209
published_at 2026-04-04T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31913
published_at 2026-04-07T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31964
published_at 2026-04-08T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31993
published_at 2026-04-09T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31997
published_at 2026-04-11T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31957
published_at 2026-04-12T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31923
published_at 2026-04-13T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31956
published_at 2026-04-16T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31935
published_at 2026-04-18T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31907
published_at 2026-04-21T12:55:00Z
11
value 0.00126
scoring_system epss
scoring_elements 0.31739
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21830
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160490
reference_id 2160490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160490
4
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
5
reference_url https://access.redhat.com/errata/RHSA-2023:0203
reference_id RHSA-2023:0203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0203
6
reference_url https://access.redhat.com/errata/RHSA-2023:0204
reference_id RHSA-2023:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0204
7
reference_url https://access.redhat.com/errata/RHSA-2023:0205
reference_id RHSA-2023:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0205
8
reference_url https://access.redhat.com/errata/RHSA-2023:0206
reference_id RHSA-2023:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0206
9
reference_url https://access.redhat.com/errata/RHSA-2023:0207
reference_id RHSA-2023:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0207
10
reference_url https://access.redhat.com/errata/RHSA-2023:0208
reference_id RHSA-2023:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0208
11
reference_url https://access.redhat.com/errata/RHSA-2023:0209
reference_id RHSA-2023:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0209
12
reference_url https://access.redhat.com/errata/RHSA-2023:0210
reference_id RHSA-2023:0210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0210
13
reference_url https://access.redhat.com/errata/RHSA-2023:0354
reference_id RHSA-2023:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0354
14
reference_url https://access.redhat.com/errata/RHSA-2023:0387
reference_id RHSA-2023:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0387
15
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
16
reference_url https://usn.ubuntu.com/5898-1/
reference_id USN-5898-1
reference_type
scores
url https://usn.ubuntu.com/5898-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21~7ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21~7ea-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2023-21830
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ecr4-rqud-gyhf
22
url VCID-fau4-ajny-nfbd
vulnerability_id VCID-fau4-ajny-nfbd
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38391
published_at 2026-04-24T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.3855
published_at 2026-04-21T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40554
published_at 2026-04-18T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-02T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40592
published_at 2026-04-11T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40513
published_at 2026-04-07T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40563
published_at 2026-04-08T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40574
published_at 2026-04-09T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40556
published_at 2026-04-12T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40536
published_at 2026-04-13T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40584
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
reference_id 2257859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257859
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-20921
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fau4-ajny-nfbd
23
url VCID-fwk5-wqvn-4qaz
vulnerability_id VCID-fwk5-wqvn-4qaz
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.4123
published_at 2026-04-24T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41339
published_at 2026-04-21T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.437
published_at 2026-04-11T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.43703
published_at 2026-04-18T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.43714
published_at 2026-04-16T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.43651
published_at 2026-04-13T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.43668
published_at 2026-04-12T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43665
published_at 2026-04-02T12:55:00Z
8
value 0.00211
scoring_system epss
scoring_elements 0.4369
published_at 2026-04-04T12:55:00Z
9
value 0.00211
scoring_system epss
scoring_elements 0.43625
published_at 2026-04-07T12:55:00Z
10
value 0.00211
scoring_system epss
scoring_elements 0.43676
published_at 2026-04-08T12:55:00Z
11
value 0.00211
scoring_system epss
scoring_elements 0.4368
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20926
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
reference_id 2257850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257850
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
29
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
30
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
31
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
32
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
33
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
34
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-20926
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk5-wqvn-4qaz
24
url VCID-gwnq-we51-3bey
vulnerability_id VCID-gwnq-we51-3bey
summary openjdk: Enhance String handling (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61748.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61748.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61748
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.0979
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09863
published_at 2026-04-24T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09702
published_at 2026-04-16T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09671
published_at 2026-04-18T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09815
published_at 2026-04-21T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.0984
published_at 2026-04-04T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09741
published_at 2026-04-07T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09812
published_at 2026-04-08T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09865
published_at 2026-04-09T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09872
published_at 2026-04-11T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09837
published_at 2026-04-12T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.09821
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61748
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403064
reference_id 2403064
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403064
4
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T16:58:40Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
5
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
6
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
7
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
8
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
9
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
10
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
11
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
12
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
7
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-61748
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwnq-we51-3bey
25
url VCID-h7n1-qfs3-v3fw
vulnerability_id VCID-h7n1-qfs3-v3fw
summary OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34731
published_at 2026-04-24T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35036
published_at 2026-04-09T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35004
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.3498
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-16T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35005
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.3496
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35055
published_at 2026-04-02T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-04T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.34962
published_at 2026-04-07T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35007
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
reference_id 2274975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2274975
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
19
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
20
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
21
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
22
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
23
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
24
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
25
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
26
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
27
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
28
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
29
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
30
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
31
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
32
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
33
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21012
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7n1-qfs3-v3fw
26
url VCID-jxgd-j4wr-tyb7
vulnerability_id VCID-jxgd-j4wr-tyb7
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34268.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34268.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-34268
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01704
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-34268
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34268
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460043
reference_id 2460043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460043
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T13:55:07Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
8
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
9
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
10
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
11
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
12
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
13
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
14
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
15
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
16
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
17
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
18
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-34268
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxgd-j4wr-tyb7
27
url VCID-jztz-7cuw-t7ep
vulnerability_id VCID-jztz-7cuw-t7ep
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.1098
published_at 2026-04-24T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11022
published_at 2026-04-21T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12082
published_at 2026-04-18T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12285
published_at 2026-04-02T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12331
published_at 2026-04-04T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.1213
published_at 2026-04-07T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12211
published_at 2026-04-08T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.1226
published_at 2026-04-09T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12267
published_at 2026-04-11T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12229
published_at 2026-04-12T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12193
published_at 2026-04-13T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.1208
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
reference_id 2257874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257874
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
39
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
40
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
41
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
42
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
43
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
44
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-20945
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jztz-7cuw-t7ep
28
url VCID-mt9c-tby1-wqe9
vulnerability_id VCID-mt9c-tby1-wqe9
summary openjdk: Improve JMX connections (Oracle CPU 2026-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21925
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10163
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10194
published_at 2026-04-24T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10104
published_at 2026-04-16T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10082
published_at 2026-04-18T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10215
published_at 2026-04-21T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10229
published_at 2026-04-04T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10125
published_at 2026-04-07T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.102
published_at 2026-04-08T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.1026
published_at 2026-04-09T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10292
published_at 2026-04-11T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10251
published_at 2026-04-12T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10232
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
reference_id 1126119
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429924
reference_id 2429924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429924
6
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:50:27Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:0847
reference_id RHSA-2026:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0847
8
reference_url https://access.redhat.com/errata/RHSA-2026:0848
reference_id RHSA-2026:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0848
9
reference_url https://access.redhat.com/errata/RHSA-2026:0849
reference_id RHSA-2026:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0849
10
reference_url https://access.redhat.com/errata/RHSA-2026:0895
reference_id RHSA-2026:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0895
11
reference_url https://access.redhat.com/errata/RHSA-2026:0896
reference_id RHSA-2026:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0896
12
reference_url https://access.redhat.com/errata/RHSA-2026:0897
reference_id RHSA-2026:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0897
13
reference_url https://access.redhat.com/errata/RHSA-2026:0898
reference_id RHSA-2026:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0898
14
reference_url https://access.redhat.com/errata/RHSA-2026:0899
reference_id RHSA-2026:0899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0899
15
reference_url https://access.redhat.com/errata/RHSA-2026:0900
reference_id RHSA-2026:0900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0900
16
reference_url https://access.redhat.com/errata/RHSA-2026:0901
reference_id RHSA-2026:0901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0901
17
reference_url https://access.redhat.com/errata/RHSA-2026:0927
reference_id RHSA-2026:0927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0927
18
reference_url https://access.redhat.com/errata/RHSA-2026:0928
reference_id RHSA-2026:0928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0928
19
reference_url https://access.redhat.com/errata/RHSA-2026:0931
reference_id RHSA-2026:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0931
20
reference_url https://access.redhat.com/errata/RHSA-2026:0932
reference_id RHSA-2026:0932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0932
21
reference_url https://access.redhat.com/errata/RHSA-2026:0933
reference_id RHSA-2026:0933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0933
22
reference_url https://access.redhat.com/errata/RHSA-2026:1606
reference_id RHSA-2026:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1606
23
reference_url https://access.redhat.com/errata/RHSA-2026:4832
reference_id RHSA-2026:4832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4832
24
reference_url https://usn.ubuntu.com/7995-1/
reference_id USN-7995-1
reference_type
scores
url https://usn.ubuntu.com/7995-1/
25
reference_url https://usn.ubuntu.com/7996-1/
reference_id USN-7996-1
reference_type
scores
url https://usn.ubuntu.com/7996-1/
26
reference_url https://usn.ubuntu.com/7997-1/
reference_id USN-7997-1
reference_type
scores
url https://usn.ubuntu.com/7997-1/
27
reference_url https://usn.ubuntu.com/7998-1/
reference_id USN-7998-1
reference_type
scores
url https://usn.ubuntu.com/7998-1/
28
reference_url https://usn.ubuntu.com/8000-1/
reference_id USN-8000-1
reference_type
scores
url https://usn.ubuntu.com/8000-1/
29
reference_url https://usn.ubuntu.com/8001-1/
reference_id USN-8001-1
reference_type
scores
url https://usn.ubuntu.com/8001-1/
30
reference_url https://usn.ubuntu.com/8002-1/
reference_id USN-8002-1
reference_type
scores
url https://usn.ubuntu.com/8002-1/
31
reference_url https://usn.ubuntu.com/8003-1/
reference_id USN-8003-1
reference_type
scores
url https://usn.ubuntu.com/8003-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-21925
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt9c-tby1-wqe9
29
url VCID-n71d-tx76-vbbd
vulnerability_id VCID-n71d-tx76-vbbd
summary OpenJDK: Out-of-bounds access in 2D image handling (8324559)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63659
published_at 2026-04-21T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63663
published_at 2026-04-12T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63678
published_at 2026-04-24T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.6363
published_at 2026-04-13T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63666
published_at 2026-04-16T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-18T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-02T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63636
published_at 2026-04-04T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63595
published_at 2026-04-07T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63647
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21145
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
reference_id 2297976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297976
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21145
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n71d-tx76-vbbd
30
url VCID-nr6u-aysf-7kgk
vulnerability_id VCID-nr6u-aysf-7kgk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36141
published_at 2026-04-24T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36365
published_at 2026-04-21T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38222
published_at 2026-04-18T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.38286
published_at 2026-04-02T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38309
published_at 2026-04-04T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38178
published_at 2026-04-07T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38228
published_at 2026-04-08T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38237
published_at 2026-04-09T12:55:00Z
8
value 0.0017
scoring_system epss
scoring_elements 0.38255
published_at 2026-04-11T12:55:00Z
9
value 0.0017
scoring_system epss
scoring_elements 0.3822
published_at 2026-04-12T12:55:00Z
10
value 0.0017
scoring_system epss
scoring_elements 0.38196
published_at 2026-04-13T12:55:00Z
11
value 0.0017
scoring_system epss
scoring_elements 0.38242
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
reference_id 2257853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257853
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
13
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
14
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
15
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
16
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
17
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
18
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
19
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
20
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
21
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
22
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
23
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
24
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
25
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
26
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
27
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
28
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
29
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
30
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
31
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
32
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
33
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
34
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
35
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
36
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
37
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
38
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
39
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
40
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
41
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
42
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-20919
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nr6u-aysf-7kgk
31
url VCID-ntga-y6cv-a3df
vulnerability_id VCID-ntga-y6cv-a3df
summary openjdk: Enhance array handling (Oracle CPU 2025-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-02T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.41948
published_at 2026-04-24T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-16T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42078
published_at 2026-04-18T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42008
published_at 2026-04-21T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-04T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42029
published_at 2026-04-07T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42081
published_at 2026-04-08T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42094
published_at 2026-04-09T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42116
published_at 2026-04-11T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42079
published_at 2026-04-12T12:55:00Z
11
value 0.002
scoring_system epss
scoring_elements 0.42054
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
reference_id 2338992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2338992
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*
15
reference_url https://www.oracle.com/security-alerts/cpujan2025.html
reference_id cpujan2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:29:12Z/
url https://www.oracle.com/security-alerts/cpujan2025.html
16
reference_url https://access.redhat.com/errata/RHSA-2025:0421
reference_id RHSA-2025:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0421
17
reference_url https://access.redhat.com/errata/RHSA-2025:0422
reference_id RHSA-2025:0422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0422
18
reference_url https://access.redhat.com/errata/RHSA-2025:0423
reference_id RHSA-2025:0423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0423
19
reference_url https://access.redhat.com/errata/RHSA-2025:0424
reference_id RHSA-2025:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0424
20
reference_url https://access.redhat.com/errata/RHSA-2025:0425
reference_id RHSA-2025:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0425
21
reference_url https://access.redhat.com/errata/RHSA-2025:0426
reference_id RHSA-2025:0426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0426
22
reference_url https://access.redhat.com/errata/RHSA-2025:0427
reference_id RHSA-2025:0427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0427
23
reference_url https://access.redhat.com/errata/RHSA-2025:0428
reference_id RHSA-2025:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0428
24
reference_url https://access.redhat.com/errata/RHSA-2025:0429
reference_id RHSA-2025:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0429
25
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
26
reference_url https://access.redhat.com/errata/RHSA-2025:2615
reference_id RHSA-2025:2615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2615
27
reference_url https://usn.ubuntu.com/7252-1/
reference_id USN-7252-1
reference_type
scores
url https://usn.ubuntu.com/7252-1/
28
reference_url https://usn.ubuntu.com/7253-1/
reference_id USN-7253-1
reference_type
scores
url https://usn.ubuntu.com/7253-1/
29
reference_url https://usn.ubuntu.com/7254-1/
reference_id USN-7254-1
reference_type
scores
url https://usn.ubuntu.com/7254-1/
30
reference_url https://usn.ubuntu.com/7255-1/
reference_id USN-7255-1
reference_type
scores
url https://usn.ubuntu.com/7255-1/
31
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
32
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.6%2B7-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.6%2B7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.6%252B7-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-21502
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ntga-y6cv-a3df
32
url VCID-nxx8-nehy-qyhg
vulnerability_id VCID-nxx8-nehy-qyhg
summary openjdk: Enhance Path Factories (Oracle CPU 2025-10)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53066
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17286
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17019
published_at 2026-04-24T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17073
published_at 2026-04-16T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17078
published_at 2026-04-18T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17113
published_at 2026-04-21T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17335
published_at 2026-04-04T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17115
published_at 2026-04-07T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17207
published_at 2026-04-08T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17263
published_at 2026-04-09T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-11T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17193
published_at 2026-04-12T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17132
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
reference_id 1118944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403063
reference_id 2403063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403063
6
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T19:44:34Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:18814
reference_id RHSA-2025:18814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18814
8
reference_url https://access.redhat.com/errata/RHSA-2025:18815
reference_id RHSA-2025:18815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18815
9
reference_url https://access.redhat.com/errata/RHSA-2025:18816
reference_id RHSA-2025:18816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18816
10
reference_url https://access.redhat.com/errata/RHSA-2025:18817
reference_id RHSA-2025:18817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18817
11
reference_url https://access.redhat.com/errata/RHSA-2025:18818
reference_id RHSA-2025:18818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18818
12
reference_url https://access.redhat.com/errata/RHSA-2025:18819
reference_id RHSA-2025:18819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18819
13
reference_url https://access.redhat.com/errata/RHSA-2025:18820
reference_id RHSA-2025:18820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18820
14
reference_url https://access.redhat.com/errata/RHSA-2025:18821
reference_id RHSA-2025:18821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18821
15
reference_url https://access.redhat.com/errata/RHSA-2025:18822
reference_id RHSA-2025:18822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18822
16
reference_url https://access.redhat.com/errata/RHSA-2025:18823
reference_id RHSA-2025:18823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18823
17
reference_url https://access.redhat.com/errata/RHSA-2025:18824
reference_id RHSA-2025:18824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18824
18
reference_url https://access.redhat.com/errata/RHSA-2025:18825
reference_id RHSA-2025:18825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18825
19
reference_url https://access.redhat.com/errata/RHSA-2025:18826
reference_id RHSA-2025:18826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18826
20
reference_url https://access.redhat.com/errata/RHSA-2025:21485
reference_id RHSA-2025:21485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21485
21
reference_url https://access.redhat.com/errata/RHSA-2025:22370
reference_id RHSA-2025:22370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22370
22
reference_url https://access.redhat.com/errata/RHSA-2025:22672
reference_id RHSA-2025:22672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22672
23
reference_url https://usn.ubuntu.com/7881-1/
reference_id USN-7881-1
reference_type
scores
url https://usn.ubuntu.com/7881-1/
24
reference_url https://usn.ubuntu.com/7882-1/
reference_id USN-7882-1
reference_type
scores
url https://usn.ubuntu.com/7882-1/
25
reference_url https://usn.ubuntu.com/7883-1/
reference_id USN-7883-1
reference_type
scores
url https://usn.ubuntu.com/7883-1/
26
reference_url https://usn.ubuntu.com/7884-1/
reference_id USN-7884-1
reference_type
scores
url https://usn.ubuntu.com/7884-1/
27
reference_url https://usn.ubuntu.com/7885-1/
reference_id USN-7885-1
reference_type
scores
url https://usn.ubuntu.com/7885-1/
28
reference_url https://usn.ubuntu.com/7900-1/
reference_id USN-7900-1
reference_type
scores
url https://usn.ubuntu.com/7900-1/
29
reference_url https://usn.ubuntu.com/7901-1/
reference_id USN-7901-1
reference_type
scores
url https://usn.ubuntu.com/7901-1/
30
reference_url https://usn.ubuntu.com/7902-1/
reference_id USN-7902-1
reference_type
scores
url https://usn.ubuntu.com/7902-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1~deb13u1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.9%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.9%252B10-1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
7
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-53066
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxx8-nehy-qyhg
33
url VCID-p9na-7jta-9yg4
vulnerability_id VCID-p9na-7jta-9yg4
summary openjdk: Enhance TLS protocol support (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30754
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25474
published_at 2026-04-21T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.29988
published_at 2026-04-09T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.3003
published_at 2026-04-02T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.30077
published_at 2026-04-04T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.29891
published_at 2026-04-07T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.29952
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30194
published_at 2026-04-24T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30305
published_at 2026-04-13T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30321
published_at 2026-04-16T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30304
published_at 2026-04-18T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30396
published_at 2026-04-11T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30352
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376784
reference_id 2376784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376784
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T15:31:20Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
22
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
23
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
24
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
25
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
26
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
27
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.8%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-30754
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9na-7jta-9yg4
34
url VCID-rggy-f3va-mfay
vulnerability_id VCID-rggy-f3va-mfay
summary OpenJDK: RangeCheckElimination array index overflow (8323231)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
reference_id
reference_type
scores
0
value 0.00721
scoring_system epss
scoring_elements 0.72563
published_at 2026-04-24T12:55:00Z
1
value 0.00721
scoring_system epss
scoring_elements 0.7249
published_at 2026-04-12T12:55:00Z
2
value 0.00721
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-13T12:55:00Z
3
value 0.00721
scoring_system epss
scoring_elements 0.72522
published_at 2026-04-16T12:55:00Z
4
value 0.00721
scoring_system epss
scoring_elements 0.72531
published_at 2026-04-18T12:55:00Z
5
value 0.00721
scoring_system epss
scoring_elements 0.72521
published_at 2026-04-21T12:55:00Z
6
value 0.00721
scoring_system epss
scoring_elements 0.7244
published_at 2026-04-02T12:55:00Z
7
value 0.00721
scoring_system epss
scoring_elements 0.72458
published_at 2026-04-04T12:55:00Z
8
value 0.00721
scoring_system epss
scoring_elements 0.72434
published_at 2026-04-07T12:55:00Z
9
value 0.00721
scoring_system epss
scoring_elements 0.72472
published_at 2026-04-08T12:55:00Z
10
value 0.00721
scoring_system epss
scoring_elements 0.72485
published_at 2026-04-09T12:55:00Z
11
value 0.00721
scoring_system epss
scoring_elements 0.72508
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
reference_id 2297977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297977
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21147
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rggy-f3va-mfay
35
url VCID-sz6r-65q1-q3bh
vulnerability_id VCID-sz6r-65q1-q3bh
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22021.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22021
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11666
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22021
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22021
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460042
reference_id 2460042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460042
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-22T13:58:16Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
8
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
9
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
10
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
11
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
12
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
13
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
14
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
15
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
16
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
17
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
18
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-22021
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sz6r-65q1-q3bh
36
url VCID-u81s-cs95-4yhx
vulnerability_id VCID-u81s-cs95-4yhx
summary openjdk: Better TLS connection support (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21587
reference_id
reference_type
scores
0
value 0.00575
scoring_system epss
scoring_elements 0.687
published_at 2026-04-02T12:55:00Z
1
value 0.00575
scoring_system epss
scoring_elements 0.68825
published_at 2026-04-24T12:55:00Z
2
value 0.00575
scoring_system epss
scoring_elements 0.68788
published_at 2026-04-16T12:55:00Z
3
value 0.00575
scoring_system epss
scoring_elements 0.68798
published_at 2026-04-18T12:55:00Z
4
value 0.00575
scoring_system epss
scoring_elements 0.68776
published_at 2026-04-21T12:55:00Z
5
value 0.00575
scoring_system epss
scoring_elements 0.68718
published_at 2026-04-04T12:55:00Z
6
value 0.00575
scoring_system epss
scoring_elements 0.68696
published_at 2026-04-07T12:55:00Z
7
value 0.00575
scoring_system epss
scoring_elements 0.68748
published_at 2026-04-08T12:55:00Z
8
value 0.00575
scoring_system epss
scoring_elements 0.68767
published_at 2026-04-09T12:55:00Z
9
value 0.00575
scoring_system epss
scoring_elements 0.68789
published_at 2026-04-11T12:55:00Z
10
value 0.00575
scoring_system epss
scoring_elements 0.68775
published_at 2026-04-12T12:55:00Z
11
value 0.00575
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21587
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359695
reference_id 2359695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359695
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-17T03:55:41Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://access.redhat.com/errata/RHSA-2025:8063
reference_id RHSA-2025:8063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8063
25
reference_url https://access.redhat.com/errata/RHSA-2025:8431
reference_id RHSA-2025:8431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8431
26
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
27
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
28
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
29
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
30
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
31
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
32
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.7%252B6-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-21587
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u81s-cs95-4yhx
37
url VCID-vbw8-4j9f-eya5
vulnerability_id VCID-vbw8-4j9f-eya5
summary openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50106
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42096
published_at 2026-04-21T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46089
published_at 2026-04-09T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.46067
published_at 2026-04-02T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.46088
published_at 2026-04-04T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.46035
published_at 2026-04-07T12:55:00Z
5
value 0.00232
scoring_system epss
scoring_elements 0.46091
published_at 2026-04-08T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.49246
published_at 2026-04-24T12:55:00Z
7
value 0.00259
scoring_system epss
scoring_elements 0.49245
published_at 2026-04-13T12:55:00Z
8
value 0.00259
scoring_system epss
scoring_elements 0.49292
published_at 2026-04-16T12:55:00Z
9
value 0.00259
scoring_system epss
scoring_elements 0.49288
published_at 2026-04-18T12:55:00Z
10
value 0.00259
scoring_system epss
scoring_elements 0.49267
published_at 2026-04-11T12:55:00Z
11
value 0.00259
scoring_system epss
scoring_elements 0.4924
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379031
reference_id 2379031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379031
5
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:22:48Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:10861
reference_id RHSA-2025:10861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10861
7
reference_url https://access.redhat.com/errata/RHSA-2025:10862
reference_id RHSA-2025:10862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10862
8
reference_url https://access.redhat.com/errata/RHSA-2025:10863
reference_id RHSA-2025:10863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10863
9
reference_url https://access.redhat.com/errata/RHSA-2025:10864
reference_id RHSA-2025:10864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10864
10
reference_url https://access.redhat.com/errata/RHSA-2025:10865
reference_id RHSA-2025:10865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10865
11
reference_url https://access.redhat.com/errata/RHSA-2025:10866
reference_id RHSA-2025:10866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10866
12
reference_url https://access.redhat.com/errata/RHSA-2025:10867
reference_id RHSA-2025:10867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10867
13
reference_url https://access.redhat.com/errata/RHSA-2025:10868
reference_id RHSA-2025:10868
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10868
14
reference_url https://access.redhat.com/errata/RHSA-2025:10869
reference_id RHSA-2025:10869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10869
15
reference_url https://access.redhat.com/errata/RHSA-2025:10870
reference_id RHSA-2025:10870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10870
16
reference_url https://access.redhat.com/errata/RHSA-2025:10873
reference_id RHSA-2025:10873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10873
17
reference_url https://access.redhat.com/errata/RHSA-2025:10874
reference_id RHSA-2025:10874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10874
18
reference_url https://access.redhat.com/errata/RHSA-2025:10875
reference_id RHSA-2025:10875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10875
19
reference_url https://access.redhat.com/errata/RHSA-2025:13656
reference_id RHSA-2025:13656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13656
20
reference_url https://access.redhat.com/errata/RHSA-2025:13675
reference_id RHSA-2025:13675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13675
21
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
22
reference_url https://usn.ubuntu.com/7667-1/
reference_id USN-7667-1
reference_type
scores
url https://usn.ubuntu.com/7667-1/
23
reference_url https://usn.ubuntu.com/7668-1/
reference_id USN-7668-1
reference_type
scores
url https://usn.ubuntu.com/7668-1/
24
reference_url https://usn.ubuntu.com/7669-1/
reference_id USN-7669-1
reference_type
scores
url https://usn.ubuntu.com/7669-1/
25
reference_url https://usn.ubuntu.com/7672-1/
reference_id USN-7672-1
reference_type
scores
url https://usn.ubuntu.com/7672-1/
26
reference_url https://usn.ubuntu.com/7673-1/
reference_id USN-7673-1
reference_type
scores
url https://usn.ubuntu.com/7673-1/
27
reference_url https://usn.ubuntu.com/7674-1/
reference_id USN-7674-1
reference_type
scores
url https://usn.ubuntu.com/7674-1/
28
reference_url https://usn.ubuntu.com/7690-1/
reference_id USN-7690-1
reference_type
scores
url https://usn.ubuntu.com/7690-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.8%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.8%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-50106
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbw8-4j9f-eya5
38
url VCID-vpnc-yu7r-bqb6
vulnerability_id VCID-vpnc-yu7r-bqb6
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16915
published_at 2026-04-24T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16971
published_at 2026-04-16T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16975
published_at 2026-04-18T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17012
published_at 2026-04-21T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.1719
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17241
published_at 2026-04-04T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17021
published_at 2026-04-07T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17111
published_at 2026-04-08T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.17169
published_at 2026-04-09T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17144
published_at 2026-04-11T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.17096
published_at 2026-04-12T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.17036
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
reference_id 2318526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318526
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
17
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
18
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
19
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
20
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
21
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
22
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
23
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
24
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
25
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
26
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
27
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
28
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
29
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
30
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
31
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
32
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
33
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
34
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
35
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
36
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
37
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
38
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
39
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.5%252B11-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21208
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpnc-yu7r-bqb6
39
url VCID-vuhe-re6z-8kax
vulnerability_id VCID-vuhe-re6z-8kax
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22025.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22025
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32344
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32039
published_at 2026-04-24T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32285
published_at 2026-04-09T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32286
published_at 2026-04-11T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32248
published_at 2026-04-12T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32217
published_at 2026-04-13T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32251
published_at 2026-04-16T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.3223
published_at 2026-04-18T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32201
published_at 2026-04-21T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32382
published_at 2026-04-04T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32207
published_at 2026-04-07T12:55:00Z
11
value 0.00128
scoring_system epss
scoring_elements 0.32256
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243805
reference_id 2243805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243805
6
reference_url https://www.debian.org/security/2023/dsa-5548
reference_id dsa-5548
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:29Z/
url https://www.debian.org/security/2023/dsa-5548
7
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
8
reference_url https://security.netapp.com/advisory/ntap-20231027-0006/
reference_id ntap-20231027-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:29Z/
url https://security.netapp.com/advisory/ntap-20231027-0006/
9
reference_url https://access.redhat.com/errata/RHSA-2023:5745
reference_id RHSA-2023:5745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5745
10
reference_url https://access.redhat.com/errata/RHSA-2023:5746
reference_id RHSA-2023:5746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5746
11
reference_url https://access.redhat.com/errata/RHSA-2023:5747
reference_id RHSA-2023:5747
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5747
12
reference_url https://access.redhat.com/errata/RHSA-2023:5750
reference_id RHSA-2023:5750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5750
13
reference_url https://access.redhat.com/errata/RHSA-2023:5751
reference_id RHSA-2023:5751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5751
14
reference_url https://access.redhat.com/errata/RHSA-2023:5752
reference_id RHSA-2023:5752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5752
15
reference_url https://access.redhat.com/errata/RHSA-2023:5753
reference_id RHSA-2023:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5753
16
reference_url https://access.redhat.com/errata/RHSA-2023:6738
reference_id RHSA-2023:6738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6738
17
reference_url https://access.redhat.com/errata/RHSA-2023:6887
reference_id RHSA-2023:6887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6887
18
reference_url https://usn.ubuntu.com/6527-1/
reference_id USN-6527-1
reference_type
scores
url https://usn.ubuntu.com/6527-1/
19
reference_url https://usn.ubuntu.com/6528-1/
reference_id USN-6528-1
reference_type
scores
url https://usn.ubuntu.com/6528-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.1%2B12-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.1%2B12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.1%252B12-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2023-22025
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vuhe-re6z-8kax
40
url VCID-wn4r-ugaa-5ydb
vulnerability_id VCID-wn4r-ugaa-5ydb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46929
published_at 2026-04-24T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46942
published_at 2026-04-08T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46939
published_at 2026-04-09T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46963
published_at 2026-04-11T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46936
published_at 2026-04-12T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46944
published_at 2026-04-21T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46999
published_at 2026-04-16T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46995
published_at 2026-04-18T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46923
published_at 2026-04-02T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.4694
published_at 2026-04-04T12:55:00Z
10
value 0.00238
scoring_system epss
scoring_elements 0.46888
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
reference_id 2257728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2257728
11
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
12
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
13
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
14
reference_url https://access.redhat.com/errata/RHSA-2024:0222
reference_id RHSA-2024:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0222
15
reference_url https://access.redhat.com/errata/RHSA-2024:0223
reference_id RHSA-2024:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0223
16
reference_url https://access.redhat.com/errata/RHSA-2024:0224
reference_id RHSA-2024:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0224
17
reference_url https://access.redhat.com/errata/RHSA-2024:0225
reference_id RHSA-2024:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0225
18
reference_url https://access.redhat.com/errata/RHSA-2024:0226
reference_id RHSA-2024:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0226
19
reference_url https://access.redhat.com/errata/RHSA-2024:0228
reference_id RHSA-2024:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0228
20
reference_url https://access.redhat.com/errata/RHSA-2024:0230
reference_id RHSA-2024:0230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0230
21
reference_url https://access.redhat.com/errata/RHSA-2024:0231
reference_id RHSA-2024:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0231
22
reference_url https://access.redhat.com/errata/RHSA-2024:0232
reference_id RHSA-2024:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0232
23
reference_url https://access.redhat.com/errata/RHSA-2024:0233
reference_id RHSA-2024:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0233
24
reference_url https://access.redhat.com/errata/RHSA-2024:0234
reference_id RHSA-2024:0234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0234
25
reference_url https://access.redhat.com/errata/RHSA-2024:0235
reference_id RHSA-2024:0235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0235
26
reference_url https://access.redhat.com/errata/RHSA-2024:0237
reference_id RHSA-2024:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0237
27
reference_url https://access.redhat.com/errata/RHSA-2024:0239
reference_id RHSA-2024:0239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0239
28
reference_url https://access.redhat.com/errata/RHSA-2024:0240
reference_id RHSA-2024:0240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0240
29
reference_url https://access.redhat.com/errata/RHSA-2024:0241
reference_id RHSA-2024:0241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0241
30
reference_url https://access.redhat.com/errata/RHSA-2024:0242
reference_id RHSA-2024:0242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0242
31
reference_url https://access.redhat.com/errata/RHSA-2024:0244
reference_id RHSA-2024:0244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0244
32
reference_url https://access.redhat.com/errata/RHSA-2024:0246
reference_id RHSA-2024:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0246
33
reference_url https://access.redhat.com/errata/RHSA-2024:0247
reference_id RHSA-2024:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0247
34
reference_url https://access.redhat.com/errata/RHSA-2024:0248
reference_id RHSA-2024:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0248
35
reference_url https://access.redhat.com/errata/RHSA-2024:0249
reference_id RHSA-2024:0249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0249
36
reference_url https://access.redhat.com/errata/RHSA-2024:0250
reference_id RHSA-2024:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0250
37
reference_url https://access.redhat.com/errata/RHSA-2024:0265
reference_id RHSA-2024:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0265
38
reference_url https://access.redhat.com/errata/RHSA-2024:0266
reference_id RHSA-2024:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0266
39
reference_url https://access.redhat.com/errata/RHSA-2024:0267
reference_id RHSA-2024:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0267
40
reference_url https://access.redhat.com/errata/RHSA-2024:1481
reference_id RHSA-2024:1481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1481
41
reference_url https://access.redhat.com/errata/RHSA-2024:1482
reference_id RHSA-2024:1482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1482
42
reference_url https://usn.ubuntu.com/6660-1/
reference_id USN-6660-1
reference_type
scores
url https://usn.ubuntu.com/6660-1/
43
reference_url https://usn.ubuntu.com/6661-1/
reference_id USN-6661-1
reference_type
scores
url https://usn.ubuntu.com/6661-1/
44
reference_url https://usn.ubuntu.com/6662-1/
reference_id USN-6662-1
reference_type
scores
url https://usn.ubuntu.com/6662-1/
45
reference_url https://usn.ubuntu.com/6696-1/
reference_id USN-6696-1
reference_type
scores
url https://usn.ubuntu.com/6696-1/
46
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.2%2B13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.2%252B13-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-20918
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wn4r-ugaa-5ydb
41
url VCID-xte1-h9nn-4bbk
vulnerability_id VCID-xte1-h9nn-4bbk
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22018.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22018.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22018
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11666
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22018
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22018
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460041
reference_id 2460041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460041
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:05:52Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
8
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
9
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
10
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
11
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
12
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
13
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
14
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
15
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
16
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
17
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
18
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-22018
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xte1-h9nn-4bbk
42
url VCID-y8bc-k5qu-c7f5
vulnerability_id VCID-y8bc-k5qu-c7f5
summary openjdk: Improve compiler transformations (Oracle CPU 2025-04)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30691
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-02T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58811
published_at 2026-04-24T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58851
published_at 2026-04-18T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58814
published_at 2026-04-13T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58846
published_at 2026-04-16T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-04T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58775
published_at 2026-04-07T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58827
published_at 2026-04-21T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58833
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
reference_id 1103897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
reference_id 1103898
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
reference_id 1103899
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
reference_id 1103900
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359694
reference_id 2359694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359694
9
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:24:18Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:3844
reference_id RHSA-2025:3844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3844
11
reference_url https://access.redhat.com/errata/RHSA-2025:3845
reference_id RHSA-2025:3845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3845
12
reference_url https://access.redhat.com/errata/RHSA-2025:3846
reference_id RHSA-2025:3846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3846
13
reference_url https://access.redhat.com/errata/RHSA-2025:3847
reference_id RHSA-2025:3847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3847
14
reference_url https://access.redhat.com/errata/RHSA-2025:3848
reference_id RHSA-2025:3848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3848
15
reference_url https://access.redhat.com/errata/RHSA-2025:3849
reference_id RHSA-2025:3849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3849
16
reference_url https://access.redhat.com/errata/RHSA-2025:3850
reference_id RHSA-2025:3850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3850
17
reference_url https://access.redhat.com/errata/RHSA-2025:3852
reference_id RHSA-2025:3852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3852
18
reference_url https://access.redhat.com/errata/RHSA-2025:3853
reference_id RHSA-2025:3853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3853
19
reference_url https://access.redhat.com/errata/RHSA-2025:3854
reference_id RHSA-2025:3854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3854
20
reference_url https://access.redhat.com/errata/RHSA-2025:3855
reference_id RHSA-2025:3855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3855
21
reference_url https://access.redhat.com/errata/RHSA-2025:3856
reference_id RHSA-2025:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3856
22
reference_url https://access.redhat.com/errata/RHSA-2025:3857
reference_id RHSA-2025:3857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3857
23
reference_url https://access.redhat.com/errata/RHSA-2025:7508
reference_id RHSA-2025:7508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7508
24
reference_url https://usn.ubuntu.com/7480-1/
reference_id USN-7480-1
reference_type
scores
url https://usn.ubuntu.com/7480-1/
25
reference_url https://usn.ubuntu.com/7481-1/
reference_id USN-7481-1
reference_type
scores
url https://usn.ubuntu.com/7481-1/
26
reference_url https://usn.ubuntu.com/7482-1/
reference_id USN-7482-1
reference_type
scores
url https://usn.ubuntu.com/7482-1/
27
reference_url https://usn.ubuntu.com/7483-1/
reference_id USN-7483-1
reference_type
scores
url https://usn.ubuntu.com/7483-1/
28
reference_url https://usn.ubuntu.com/7484-1/
reference_id USN-7484-1
reference_type
scores
url https://usn.ubuntu.com/7484-1/
29
reference_url https://usn.ubuntu.com/7531-1/
reference_id USN-7531-1
reference_type
scores
url https://usn.ubuntu.com/7531-1/
30
reference_url https://usn.ubuntu.com/7533-1/
reference_id USN-7533-1
reference_type
scores
url https://usn.ubuntu.com/7533-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.7%2B6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.7%252B6-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2025-30691
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8bc-k5qu-c7f5
43
url VCID-z356-tw9t-q7bp
vulnerability_id VCID-z356-tw9t-q7bp
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34394
published_at 2026-04-24T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34685
published_at 2026-04-16T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34671
published_at 2026-04-18T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34631
published_at 2026-04-21T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34636
published_at 2026-04-07T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34708
published_at 2026-04-09T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
10
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
11
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21210
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
reference_id 1085696
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
reference_id 2318524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318524
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*
12
reference_url https://security.gentoo.org/glsa/202412-07
reference_id GLSA-202412-07
reference_type
scores
url https://security.gentoo.org/glsa/202412-07
13
reference_url https://access.redhat.com/errata/RHSA-2024:10926
reference_id RHSA-2024:10926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10926
14
reference_url https://access.redhat.com/errata/RHSA-2024:8116
reference_id RHSA-2024:8116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8116
15
reference_url https://access.redhat.com/errata/RHSA-2024:8117
reference_id RHSA-2024:8117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8117
16
reference_url https://access.redhat.com/errata/RHSA-2024:8118
reference_id RHSA-2024:8118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8118
17
reference_url https://access.redhat.com/errata/RHSA-2024:8119
reference_id RHSA-2024:8119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8119
18
reference_url https://access.redhat.com/errata/RHSA-2024:8120
reference_id RHSA-2024:8120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8120
19
reference_url https://access.redhat.com/errata/RHSA-2024:8121
reference_id RHSA-2024:8121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8121
20
reference_url https://access.redhat.com/errata/RHSA-2024:8122
reference_id RHSA-2024:8122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8122
21
reference_url https://access.redhat.com/errata/RHSA-2024:8123
reference_id RHSA-2024:8123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8123
22
reference_url https://access.redhat.com/errata/RHSA-2024:8124
reference_id RHSA-2024:8124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8124
23
reference_url https://access.redhat.com/errata/RHSA-2024:8125
reference_id RHSA-2024:8125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8125
24
reference_url https://access.redhat.com/errata/RHSA-2024:8126
reference_id RHSA-2024:8126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8126
25
reference_url https://access.redhat.com/errata/RHSA-2024:8127
reference_id RHSA-2024:8127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8127
26
reference_url https://access.redhat.com/errata/RHSA-2024:8128
reference_id RHSA-2024:8128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8128
27
reference_url https://access.redhat.com/errata/RHSA-2024:8129
reference_id RHSA-2024:8129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8129
28
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
29
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
30
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
31
reference_url https://usn.ubuntu.com/7099-1/
reference_id USN-7099-1
reference_type
scores
url https://usn.ubuntu.com/7099-1/
32
reference_url https://usn.ubuntu.com/7124-1/
reference_id USN-7124-1
reference_type
scores
url https://usn.ubuntu.com/7124-1/
33
reference_url https://usn.ubuntu.com/7338-1/
reference_id USN-7338-1
reference_type
scores
url https://usn.ubuntu.com/7338-1/
34
reference_url https://usn.ubuntu.com/7339-1/
reference_id USN-7339-1
reference_type
scores
url https://usn.ubuntu.com/7339-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.5%2B11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.5%252B11-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21210
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z356-tw9t-q7bp
44
url VCID-zdra-bzqn-4ug9
vulnerability_id VCID-zdra-bzqn-4ug9
summary OpenJDK: integer overflow in C1 compiler address generation (8322122)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.67661
published_at 2026-04-24T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67627
published_at 2026-04-08T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.6764
published_at 2026-04-09T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.67663
published_at 2026-04-18T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-12T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-13T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.6765
published_at 2026-04-16T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67641
published_at 2026-04-21T12:55:00Z
8
value 0.0054
scoring_system epss
scoring_elements 0.67576
published_at 2026-04-02T12:55:00Z
9
value 0.0054
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-04T12:55:00Z
10
value 0.0054
scoring_system epss
scoring_elements 0.67575
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
reference_id 1069678
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
reference_id 2275003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275003
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*
19
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
20
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html
21
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
22
reference_url https://access.redhat.com/errata/RHSA-2024:1815
reference_id RHSA-2024:1815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1815
23
reference_url https://access.redhat.com/errata/RHSA-2024:1816
reference_id RHSA-2024:1816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1816
24
reference_url https://access.redhat.com/errata/RHSA-2024:1817
reference_id RHSA-2024:1817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1817
25
reference_url https://access.redhat.com/errata/RHSA-2024:1818
reference_id RHSA-2024:1818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1818
26
reference_url https://access.redhat.com/errata/RHSA-2024:1819
reference_id RHSA-2024:1819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1819
27
reference_url https://access.redhat.com/errata/RHSA-2024:1820
reference_id RHSA-2024:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1820
28
reference_url https://access.redhat.com/errata/RHSA-2024:1821
reference_id RHSA-2024:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1821
29
reference_url https://access.redhat.com/errata/RHSA-2024:1822
reference_id RHSA-2024:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1822
30
reference_url https://access.redhat.com/errata/RHSA-2024:1823
reference_id RHSA-2024:1823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1823
31
reference_url https://access.redhat.com/errata/RHSA-2024:1824
reference_id RHSA-2024:1824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1824
32
reference_url https://access.redhat.com/errata/RHSA-2024:1825
reference_id RHSA-2024:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1825
33
reference_url https://access.redhat.com/errata/RHSA-2024:1826
reference_id RHSA-2024:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1826
34
reference_url https://access.redhat.com/errata/RHSA-2024:1827
reference_id RHSA-2024:1827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1827
35
reference_url https://access.redhat.com/errata/RHSA-2024:1828
reference_id RHSA-2024:1828
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1828
36
reference_url https://usn.ubuntu.com/6810-1/
reference_id USN-6810-1
reference_type
scores
url https://usn.ubuntu.com/6810-1/
37
reference_url https://usn.ubuntu.com/6811-1/
reference_id USN-6811-1
reference_type
scores
url https://usn.ubuntu.com/6811-1/
38
reference_url https://usn.ubuntu.com/6812-1/
reference_id USN-6812-1
reference_type
scores
url https://usn.ubuntu.com/6812-1/
39
reference_url https://usn.ubuntu.com/6813-1/
reference_id USN-6813-1
reference_type
scores
url https://usn.ubuntu.com/6813-1/
40
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21068
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdra-bzqn-4ug9
45
url VCID-zgpr-3zft-zqgt
vulnerability_id VCID-zgpr-3zft-zqgt
summary OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68605
published_at 2026-04-24T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68569
published_at 2026-04-11T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68556
published_at 2026-04-21T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68526
published_at 2026-04-13T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68566
published_at 2026-04-16T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.68579
published_at 2026-04-18T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68479
published_at 2026-04-02T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68498
published_at 2026-04-04T12:55:00Z
8
value 0.00568
scoring_system epss
scoring_elements 0.68475
published_at 2026-04-07T12:55:00Z
9
value 0.00568
scoring_system epss
scoring_elements 0.68525
published_at 2026-04-08T12:55:00Z
10
value 0.00568
scoring_system epss
scoring_elements 0.68543
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
reference_id 2297963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297963
10
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
11
reference_url https://security.netapp.com/advisory/ntap-20240719-0008/
reference_id ntap-20240719-0008
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/
url https://security.netapp.com/advisory/ntap-20240719-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:4560
reference_id RHSA-2024:4560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4560
13
reference_url https://access.redhat.com/errata/RHSA-2024:4561
reference_id RHSA-2024:4561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4561
14
reference_url https://access.redhat.com/errata/RHSA-2024:4562
reference_id RHSA-2024:4562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4562
15
reference_url https://access.redhat.com/errata/RHSA-2024:4563
reference_id RHSA-2024:4563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4563
16
reference_url https://access.redhat.com/errata/RHSA-2024:4564
reference_id RHSA-2024:4564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4564
17
reference_url https://access.redhat.com/errata/RHSA-2024:4565
reference_id RHSA-2024:4565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4565
18
reference_url https://access.redhat.com/errata/RHSA-2024:4566
reference_id RHSA-2024:4566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4566
19
reference_url https://access.redhat.com/errata/RHSA-2024:4567
reference_id RHSA-2024:4567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4567
20
reference_url https://access.redhat.com/errata/RHSA-2024:4568
reference_id RHSA-2024:4568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4568
21
reference_url https://access.redhat.com/errata/RHSA-2024:4569
reference_id RHSA-2024:4569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4569
22
reference_url https://access.redhat.com/errata/RHSA-2024:4570
reference_id RHSA-2024:4570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4570
23
reference_url https://access.redhat.com/errata/RHSA-2024:4571
reference_id RHSA-2024:4571
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4571
24
reference_url https://access.redhat.com/errata/RHSA-2024:4572
reference_id RHSA-2024:4572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4572
25
reference_url https://access.redhat.com/errata/RHSA-2024:4573
reference_id RHSA-2024:4573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4573
26
reference_url https://usn.ubuntu.com/6929-1/
reference_id USN-6929-1
reference_type
scores
url https://usn.ubuntu.com/6929-1/
27
reference_url https://usn.ubuntu.com/6930-1/
reference_id USN-6930-1
reference_type
scores
url https://usn.ubuntu.com/6930-1/
28
reference_url https://usn.ubuntu.com/6931-1/
reference_id USN-6931-1
reference_type
scores
url https://usn.ubuntu.com/6931-1/
29
reference_url https://usn.ubuntu.com/6932-1/
reference_id USN-6932-1
reference_type
scores
url https://usn.ubuntu.com/6932-1/
30
reference_url https://usn.ubuntu.com/7096-1/
reference_id USN-7096-1
reference_type
scores
url https://usn.ubuntu.com/7096-1/
31
reference_url https://usn.ubuntu.com/7097-1/
reference_id USN-7097-1
reference_type
scores
url https://usn.ubuntu.com/7097-1/
32
reference_url https://usn.ubuntu.com/7098-1/
reference_id USN-7098-1
reference_type
scores
url https://usn.ubuntu.com/7098-1/
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.10%2B7-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.10%252B7-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~6ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~6ea-1%3Fdistro=trixie
3
url pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~8ea-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~8ea-1%3Fdistro=trixie
4
url pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-sz6r-65q1-q3bh
5
vulnerability VCID-xte1-h9nn-4bbk
6
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-1%3Fdistro=trixie
5
url pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11~9ea-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11~9ea-2%3Fdistro=trixie
6
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2024-21140
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zgpr-3zft-zqgt
46
url VCID-zsun-4q6p-8fek
vulnerability_id VCID-zsun-4q6p-8fek
summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22013.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22013.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22013
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12118
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22013
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22013
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
reference_id 1134894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460040
reference_id 2460040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460040
6
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:09:34Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
7
reference_url https://access.redhat.com/errata/RHSA-2026:9254
reference_id RHSA-2026:9254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9254
8
reference_url https://access.redhat.com/errata/RHSA-2026:9255
reference_id RHSA-2026:9255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9255
9
reference_url https://access.redhat.com/errata/RHSA-2026:9256
reference_id RHSA-2026:9256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9256
10
reference_url https://access.redhat.com/errata/RHSA-2026:9682
reference_id RHSA-2026:9682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9682
11
reference_url https://access.redhat.com/errata/RHSA-2026:9684
reference_id RHSA-2026:9684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9684
12
reference_url https://access.redhat.com/errata/RHSA-2026:9685
reference_id RHSA-2026:9685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9685
13
reference_url https://access.redhat.com/errata/RHSA-2026:9687
reference_id RHSA-2026:9687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9687
14
reference_url https://access.redhat.com/errata/RHSA-2026:9688
reference_id RHSA-2026:9688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9688
15
reference_url https://access.redhat.com/errata/RHSA-2026:9690
reference_id RHSA-2026:9690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9690
16
reference_url https://access.redhat.com/errata/RHSA-2026:9691
reference_id RHSA-2026:9691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9691
17
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
18
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
fixed_packages
0
url pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
purl pkg:deb/debian/openjdk-21@21.0.11%2B10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie
aliases CVE-2026-22013
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsun-4q6p-8fek
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-21@21.0.11%252B10-1%3Fdistro=trixie