Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/460155?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "type": "apk", "namespace": "alpine", "name": "openjdk8", "version": "8.322.06-r0", "qualifiers": { "arch": "aarch64", "distroversion": "v3.19", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.345.01-r0", "latest_non_vulnerable_version": "8.402.06-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34358?format=api", "vulnerability_id": "VCID-3aae-859j-1bg9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26473", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26494", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041417", "reference_id": "2041417", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041417" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21293" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3aae-859j-1bg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34372?format=api", "vulnerability_id": "VCID-3hj5-z3ck-tkha", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041785", "reference_id": "2041785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041785" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5057", "reference_id": "dsa-5057", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5057" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5058", "reference_id": "dsa-5058", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5058" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21365" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hj5-z3ck-tkha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34370?format=api", "vulnerability_id": "VCID-4thy-7844-xuc9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041491", "reference_id": "2041491", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041491" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21360" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4thy-7844-xuc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34360?format=api", "vulnerability_id": "VCID-5xg6-kds9-g3hf", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041427", "reference_id": "2041427", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041427" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21294" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xg6-kds9-g3hf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34368?format=api", "vulnerability_id": "VCID-98bc-5jrc-5kas", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041897", "reference_id": "2041897", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041897" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21341" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98bc-5jrc-5kas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34369?format=api", "vulnerability_id": "VCID-cfyt-zw34-xbaz", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21349.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21349.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21349", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3028", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30425", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30286", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30333", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30374", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21349" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046273", "reference_id": "2046273", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046273" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21349" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfyt-zw34-xbaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34356?format=api", "vulnerability_id": "VCID-g2fj-4mgh-23fs", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30847", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32868", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32803", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32838", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041400", "reference_id": "2041400", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041400" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21283" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2fj-4mgh-23fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34354?format=api", "vulnerability_id": "VCID-ne6z-gg9f-qkcy", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33007", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33041", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3295", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32887", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041435", "reference_id": "2041435", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041435" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21282" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ne6z-gg9f-qkcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34362?format=api", "vulnerability_id": "VCID-rgbz-akft-f7e6", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33007", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33041", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3295", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32887", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041439", "reference_id": "2041439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041439" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21296" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-akft-f7e6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34365?format=api", "vulnerability_id": "VCID-shg1-t3nh-67hk", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45878", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.459", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.4587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45877", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041878", "reference_id": "2041878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041878" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21305" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-shg1-t3nh-67hk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34367?format=api", "vulnerability_id": "VCID-tr4r-wm4s-auej", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91031", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.9104", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91067", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041884", "reference_id": "2041884", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041884" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21340" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tr4r-wm4s-auej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34363?format=api", "vulnerability_id": "VCID-ws4h-edpn-nudd", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26898", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26933", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2672", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26841", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26739", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041472", "reference_id": "2041472", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041472" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4918", "reference_id": "RHSA-2022:4918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4919", "reference_id": "RHSA-2022:4919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4922", "reference_id": "RHSA-2022:4922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4922" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4957", "reference_id": "RHSA-2022:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21299" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-edpn-nudd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34351?format=api", "vulnerability_id": "VCID-xfqx-d3jw-yuhn", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24263", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2428", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24237", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041801", "reference_id": "2041801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041801" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/", "reference_id": "2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/", "reference_id": "4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5057", "reference_id": "dsa-5057", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5057" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5058", "reference_id": "dsa-5058", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5058" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/", "reference_id": "KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/460155?format=api", "purl": "pkg:apk/alpine/openjdk8@8.322.06-r0?arch=aarch64&distroversion=v3.19&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" } ], "aliases": [ "CVE-2022-21248" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqx-d3jw-yuhn" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk8@8.322.06-r0%3Farch=aarch64&distroversion=v3.19&reponame=community" }