Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
Typeapk
Namespacealpine
Nameopenjdk11
Version11.0.17_p8-r0
Qualifiers
arch aarch64
distroversion v3.15
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version11.0.18_p10-r0
Latest_non_vulnerable_version11.0.19_p7-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-44t4-tppq-ybb3
vulnerability_id VCID-44t4-tppq-ybb3
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21549
reference_id
reference_type
scores
0
value 0.00227
scoring_system epss
scoring_elements 0.45479
published_at 2026-04-02T12:55:00Z
1
value 0.00227
scoring_system epss
scoring_elements 0.45501
published_at 2026-04-09T12:55:00Z
2
value 0.00227
scoring_system epss
scoring_elements 0.45446
published_at 2026-04-07T12:55:00Z
3
value 0.00227
scoring_system epss
scoring_elements 0.455
published_at 2026-04-08T12:55:00Z
4
value 0.00227
scoring_system epss
scoring_elements 0.45521
published_at 2026-04-11T12:55:00Z
5
value 0.00227
scoring_system epss
scoring_elements 0.45491
published_at 2026-04-12T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.45496
published_at 2026-04-13T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.45544
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21549
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108547
reference_id 2108547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108547
8
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
9
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
10
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
11
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
12
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-21549
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44t4-tppq-ybb3
1
url VCID-47ae-xdqr-6qgb
vulnerability_id VCID-47ae-xdqr-6qgb
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21540
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.6268
published_at 2026-04-02T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62713
published_at 2026-04-04T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62677
published_at 2026-04-07T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.62728
published_at 2026-04-13T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62745
published_at 2026-04-09T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62763
published_at 2026-04-11T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62752
published_at 2026-04-12T12:55:00Z
7
value 0.00433
scoring_system epss
scoring_elements 0.62769
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21540
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108540
reference_id 2108540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108540
8
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
9
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
10
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
11
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
12
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
13
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
14
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
15
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
16
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
17
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
18
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
19
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
20
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
21
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
22
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
23
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
24
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
25
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
26
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
27
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
28
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
29
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-21540
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47ae-xdqr-6qgb
2
url VCID-fwv1-sj5y-xygd
vulnerability_id VCID-fwv1-sj5y-xygd
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21619
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49517
published_at 2026-04-02T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49544
published_at 2026-04-04T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49496
published_at 2026-04-07T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49551
published_at 2026-04-08T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49546
published_at 2026-04-09T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49563
published_at 2026-04-11T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49535
published_at 2026-04-12T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49537
published_at 2026-04-13T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49583
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21619
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133745
reference_id 2133745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133745
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
17
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
18
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
19
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
20
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
21
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
22
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
23
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
24
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
25
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
26
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
27
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
28
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
29
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
30
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
31
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
32
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
33
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
34
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
35
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
36
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-21619
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwv1-sj5y-xygd
3
url VCID-h2w2-8e43-j3g6
vulnerability_id VCID-h2w2-8e43-j3g6
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21624
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42206
published_at 2026-04-02T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-09T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42175
published_at 2026-04-07T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42226
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.4222
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42257
published_at 2026-04-11T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50242
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133765
reference_id 2133765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133765
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
17
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
18
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
19
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
20
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
21
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
22
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
23
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
24
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
25
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
26
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
27
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
28
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
29
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
30
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
31
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
32
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
33
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
34
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
35
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
36
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-21624
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2w2-8e43-j3g6
4
url VCID-jm9f-9y4b-qye7
vulnerability_id VCID-jm9f-9y4b-qye7
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39399
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.52035
published_at 2026-04-02T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52061
published_at 2026-04-04T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52027
published_at 2026-04-07T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52081
published_at 2026-04-08T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52077
published_at 2026-04-09T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52129
published_at 2026-04-11T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52113
published_at 2026-04-12T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52098
published_at 2026-04-13T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52138
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39399
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133776
reference_id 2133776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133776
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
17
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
18
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
19
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
20
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
21
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
22
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
23
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
24
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
25
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
26
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-39399
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jm9f-9y4b-qye7
5
url VCID-nfjb-tkzv-fudg
vulnerability_id VCID-nfjb-tkzv-fudg
summary The package com.google.code.gson:gson before 2.8.9 is vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25647.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25647
reference_id
reference_type
scores
0
value 0.02798
scoring_system epss
scoring_elements 0.86099
published_at 2026-04-09T12:55:00Z
1
value 0.02798
scoring_system epss
scoring_elements 0.86124
published_at 2026-04-16T12:55:00Z
2
value 0.02798
scoring_system epss
scoring_elements 0.86106
published_at 2026-04-13T12:55:00Z
3
value 0.02798
scoring_system epss
scoring_elements 0.86111
published_at 2026-04-12T12:55:00Z
4
value 0.02798
scoring_system epss
scoring_elements 0.86114
published_at 2026-04-11T12:55:00Z
5
value 0.02798
scoring_system epss
scoring_elements 0.86053
published_at 2026-04-02T12:55:00Z
6
value 0.02798
scoring_system epss
scoring_elements 0.8607
published_at 2026-04-04T12:55:00Z
7
value 0.02798
scoring_system epss
scoring_elements 0.86069
published_at 2026-04-07T12:55:00Z
8
value 0.02798
scoring_system epss
scoring_elements 0.86089
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25647
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/google/gson
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/google/gson
5
reference_url https://github.com/google/gson/pull/1991
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/google/gson/pull/1991
6
reference_url https://github.com/google/gson/pull/1991/commits
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/google/gson/pull/1991/commits
7
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00015.html
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/05/msg00015.html
8
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00009.html
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/09/msg00009.html
9
reference_url https://security.netapp.com/advisory/ntap-20220901-0009
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220901-0009
10
reference_url https://security.netapp.com/advisory/ntap-20220901-0009/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220901-0009/
11
reference_url https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
12
reference_url https://www.debian.org/security/2022/dsa-5227
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5227
13
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010670
reference_id 1010670
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010670
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2080850
reference_id 2080850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2080850
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-25647
reference_id CVE-2022-25647
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-25647
17
reference_url https://github.com/advisories/GHSA-4jrv-ppp4-jm57
reference_id GHSA-4jrv-ppp4-jm57
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4jrv-ppp4-jm57
18
reference_url https://access.redhat.com/errata/RHSA-2022:4985
reference_id RHSA-2022:4985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4985
19
reference_url https://access.redhat.com/errata/RHSA-2022:5029
reference_id RHSA-2022:5029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5029
20
reference_url https://access.redhat.com/errata/RHSA-2022:5892
reference_id RHSA-2022:5892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5892
21
reference_url https://access.redhat.com/errata/RHSA-2022:5893
reference_id RHSA-2022:5893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5893
22
reference_url https://access.redhat.com/errata/RHSA-2022:5894
reference_id RHSA-2022:5894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5894
23
reference_url https://access.redhat.com/errata/RHSA-2022:5903
reference_id RHSA-2022:5903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5903
24
reference_url https://access.redhat.com/errata/RHSA-2022:5928
reference_id RHSA-2022:5928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5928
25
reference_url https://access.redhat.com/errata/RHSA-2022:6819
reference_id RHSA-2022:6819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6819
26
reference_url https://access.redhat.com/errata/RHSA-2022:6835
reference_id RHSA-2022:6835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6835
27
reference_url https://access.redhat.com/errata/RHSA-2023:3299
reference_id RHSA-2023:3299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3299
28
reference_url https://access.redhat.com/errata/RHSA-2025:4437
reference_id RHSA-2025:4437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4437
29
reference_url https://usn.ubuntu.com/6692-1/
reference_id USN-6692-1
reference_type
scores
url https://usn.ubuntu.com/6692-1/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-25647, GHSA-4jrv-ppp4-jm57
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfjb-tkzv-fudg
6
url VCID-rfs8-njaq-qkc8
vulnerability_id VCID-rfs8-njaq-qkc8
summary
Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.

A fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.
references
0
reference_url http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-34169
reference_id
reference_type
scores
0
value 0.06658
scoring_system epss
scoring_elements 0.91216
published_at 2026-04-12T12:55:00Z
1
value 0.06658
scoring_system epss
scoring_elements 0.91212
published_at 2026-04-11T12:55:00Z
2
value 0.06658
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-09T12:55:00Z
3
value 0.06658
scoring_system epss
scoring_elements 0.91199
published_at 2026-04-08T12:55:00Z
4
value 0.06658
scoring_system epss
scoring_elements 0.91186
published_at 2026-04-07T12:55:00Z
5
value 0.06658
scoring_system epss
scoring_elements 0.91215
published_at 2026-04-13T12:55:00Z
6
value 0.06658
scoring_system epss
scoring_elements 0.91239
published_at 2026-04-16T12:55:00Z
7
value 0.08992
scoring_system epss
scoring_elements 0.92592
published_at 2026-04-04T12:55:00Z
8
value 0.08992
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-34169
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git
9
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
10
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
11
reference_url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
12
reference_url https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
13
reference_url https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
14
reference_url https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
15
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-34169
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-34169
29
reference_url https://security.gentoo.org/glsa/202401-25
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202401-25
30
reference_url https://security.netapp.com/advisory/ntap-20220729-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220729-0009
31
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
32
reference_url https://www.debian.org/security/2022/dsa-5188
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5188
33
reference_url https://www.debian.org/security/2022/dsa-5192
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5192
34
reference_url https://www.debian.org/security/2022/dsa-5256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5256
35
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
36
reference_url https://xalan.apache.org
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://xalan.apache.org
37
reference_url http://www.openwall.com/lists/oss-security/2022/07/19/5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/19/5
38
reference_url http://www.openwall.com/lists/oss-security/2022/07/19/6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/19/6
39
reference_url http://www.openwall.com/lists/oss-security/2022/07/20/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/20/2
40
reference_url http://www.openwall.com/lists/oss-security/2022/07/20/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/20/3
41
reference_url http://www.openwall.com/lists/oss-security/2022/10/18/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/10/18/2
42
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/04/8
43
reference_url http://www.openwall.com/lists/oss-security/2022/11/07/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/11/07/2
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860
reference_id 1015860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108554
reference_id 2108554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108554
46
reference_url https://github.com/advisories/GHSA-9339-86wc-4qgf
reference_id GHSA-9339-86wc-4qgf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9339-86wc-4qgf
47
reference_url https://security.gentoo.org/glsa/202405-16
reference_id GLSA-202405-16
reference_type
scores
url https://security.gentoo.org/glsa/202405-16
48
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
49
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
50
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
51
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
52
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
53
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
54
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
55
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
56
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
57
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
58
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
59
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
60
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
61
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
62
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
63
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
64
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
65
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
66
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
67
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
68
reference_url https://access.redhat.com/errata/RHSA-2024:3708
reference_id RHSA-2024:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3708
69
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
70
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-34169, GHSA-9339-86wc-4qgf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfs8-njaq-qkc8
7
url VCID-t4r8-ujpb-5kdk
vulnerability_id VCID-t4r8-ujpb-5kdk
summary Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21541
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60711
published_at 2026-04-02T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60804
published_at 2026-04-16T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60741
published_at 2026-04-04T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60706
published_at 2026-04-07T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60755
published_at 2026-04-08T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.6077
published_at 2026-04-09T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60795
published_at 2026-04-11T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60781
published_at 2026-04-12T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108543
reference_id 2108543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108543
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
reference_id H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
reference_id I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
reference_id JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
reference_id KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
reference_id L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
13
reference_url https://security.netapp.com/advisory/ntap-20220729-0009/
reference_id ntap-20220729-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://security.netapp.com/advisory/ntap-20220729-0009/
14
reference_url https://access.redhat.com/errata/RHSA-2022:5681
reference_id RHSA-2022:5681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5681
15
reference_url https://access.redhat.com/errata/RHSA-2022:5683
reference_id RHSA-2022:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5683
16
reference_url https://access.redhat.com/errata/RHSA-2022:5684
reference_id RHSA-2022:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5684
17
reference_url https://access.redhat.com/errata/RHSA-2022:5685
reference_id RHSA-2022:5685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5685
18
reference_url https://access.redhat.com/errata/RHSA-2022:5687
reference_id RHSA-2022:5687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5687
19
reference_url https://access.redhat.com/errata/RHSA-2022:5695
reference_id RHSA-2022:5695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5695
20
reference_url https://access.redhat.com/errata/RHSA-2022:5696
reference_id RHSA-2022:5696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5696
21
reference_url https://access.redhat.com/errata/RHSA-2022:5697
reference_id RHSA-2022:5697
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5697
22
reference_url https://access.redhat.com/errata/RHSA-2022:5698
reference_id RHSA-2022:5698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5698
23
reference_url https://access.redhat.com/errata/RHSA-2022:5700
reference_id RHSA-2022:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5700
24
reference_url https://access.redhat.com/errata/RHSA-2022:5701
reference_id RHSA-2022:5701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5701
25
reference_url https://access.redhat.com/errata/RHSA-2022:5709
reference_id RHSA-2022:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5709
26
reference_url https://access.redhat.com/errata/RHSA-2022:5726
reference_id RHSA-2022:5726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5726
27
reference_url https://access.redhat.com/errata/RHSA-2022:5736
reference_id RHSA-2022:5736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5736
28
reference_url https://access.redhat.com/errata/RHSA-2022:5753
reference_id RHSA-2022:5753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5753
29
reference_url https://access.redhat.com/errata/RHSA-2022:5754
reference_id RHSA-2022:5754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5754
30
reference_url https://access.redhat.com/errata/RHSA-2022:5755
reference_id RHSA-2022:5755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5755
31
reference_url https://access.redhat.com/errata/RHSA-2022:5756
reference_id RHSA-2022:5756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5756
32
reference_url https://access.redhat.com/errata/RHSA-2022:5757
reference_id RHSA-2022:5757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5757
33
reference_url https://access.redhat.com/errata/RHSA-2022:5758
reference_id RHSA-2022:5758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5758
34
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
35
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
reference_id YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-21541
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4r8-ujpb-5kdk
8
url VCID-t5sp-ea5b-f7af
vulnerability_id VCID-t5sp-ea5b-f7af
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21626.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21626
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47467
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47488
published_at 2026-04-04T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47437
published_at 2026-04-07T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47492
published_at 2026-04-08T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.4749
published_at 2026-04-09T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47511
published_at 2026-04-11T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47487
published_at 2026-04-12T12:55:00Z
7
value 0.00242
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-13T12:55:00Z
8
value 0.00242
scoring_system epss
scoring_elements 0.47554
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133753
reference_id 2133753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133753
11
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
12
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
13
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
14
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
15
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
16
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
17
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
18
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
19
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
20
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
21
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
22
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
23
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
24
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
25
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
26
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
27
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
28
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
29
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
30
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
31
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
32
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
33
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
34
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
35
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-21626
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5sp-ea5b-f7af
9
url VCID-um54-6ggz-gqf9
vulnerability_id VCID-um54-6ggz-gqf9
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21628
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48077
published_at 2026-04-02T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48105
published_at 2026-04-13T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48094
published_at 2026-04-12T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48119
published_at 2026-04-11T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.48096
published_at 2026-04-09T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-08T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48098
published_at 2026-04-04T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48048
published_at 2026-04-07T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.60977
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133769
reference_id 2133769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133769
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
reference_id 37QDWJBGEPP65X43NXQTXQ7KASLUHON6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
reference_id 3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
reference_id 3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
reference_id EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
reference_id HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
18
reference_url https://security.netapp.com/advisory/ntap-20221028-0012/
reference_id ntap-20221028-0012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://security.netapp.com/advisory/ntap-20221028-0012/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
reference_id PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
20
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
21
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
22
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
23
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
24
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
25
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
26
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
27
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
28
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
29
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
30
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
31
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
32
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
33
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
34
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
35
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
36
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
37
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
38
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
39
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
40
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
41
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
42
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
43
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
0
url pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/openjdk11@11.0.17_p8-r0?arch=aarch64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community
aliases CVE-2022-21628
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-um54-6ggz-gqf9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/openjdk11@11.0.17_p8-r0%3Farch=aarch64&distroversion=v3.15&reponame=community