Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/73709?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "type": "ebuild", "namespace": "dev-java", "name": "openjdk-bin", "version": "8.322_p06", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.372_p07", "latest_non_vulnerable_version": "17.0.12_p7", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34332?format=api", "vulnerability_id": "VCID-1pdg-7bbt-kqfz", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2341", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59239", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59313", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59301", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59352", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59384", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59367", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1982874", "reference_id": "1982874", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1982874" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/", "reference_id": "A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/" }, { "reference_url": "https://security.archlinux.org/ASA-202107-53", "reference_id": "ASA-202107-53", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-53" }, { "reference_url": "https://security.archlinux.org/ASA-202107-54", "reference_id": "ASA-202107-54", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-54" }, { "reference_url": "https://security.archlinux.org/ASA-202107-65", "reference_id": "ASA-202107-65", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-65" }, { "reference_url": "https://security.archlinux.org/ASA-202107-66", "reference_id": "ASA-202107-66", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-66" }, { "reference_url": "https://security.archlinux.org/AVG-2188", "reference_id": "AVG-2188", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2188" }, { "reference_url": "https://security.archlinux.org/AVG-2189", "reference_id": "AVG-2189", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2189" }, { "reference_url": "https://security.archlinux.org/AVG-2190", "reference_id": "AVG-2190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2190" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4946", "reference_id": "dsa-4946", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4946" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/", "reference_id": "N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210723-0002/", "reference_id": "ntap-20210723-0002", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210723-0002/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/", "reference_id": "PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2774", "reference_id": "RHSA-2021:2774", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2774" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2775", "reference_id": "RHSA-2021:2775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2776", "reference_id": "RHSA-2021:2776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2777", "reference_id": "RHSA-2021:2777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2778", "reference_id": "RHSA-2021:2778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2779", "reference_id": "RHSA-2021:2779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2780", "reference_id": "RHSA-2021:2780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2781", "reference_id": "RHSA-2021:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2782", "reference_id": "RHSA-2021:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2783", "reference_id": "RHSA-2021:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2784", "reference_id": "RHSA-2021:2784", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2845", "reference_id": "RHSA-2021:2845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3292", "reference_id": "RHSA-2021:3292", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3293", "reference_id": "RHSA-2021:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4089", "reference_id": "RHSA-2021:4089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4089" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/", "reference_id": "VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-2341" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pdg-7bbt-kqfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34358?format=api", "vulnerability_id": "VCID-3aae-859j-1bg9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26473", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26494", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041417", "reference_id": "2041417", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041417" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21293" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3aae-859j-1bg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34333?format=api", "vulnerability_id": "VCID-3b1m-995s-r7a8", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2369", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56676", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56788", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56791", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56768", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5682", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56824", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56832", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56809", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1982879", "reference_id": "1982879", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1982879" }, { "reference_url": "https://security.archlinux.org/ASA-202107-53", "reference_id": "ASA-202107-53", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-53" }, { "reference_url": "https://security.archlinux.org/ASA-202107-54", "reference_id": "ASA-202107-54", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-54" }, { "reference_url": "https://security.archlinux.org/ASA-202107-65", "reference_id": "ASA-202107-65", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-65" }, { "reference_url": "https://security.archlinux.org/ASA-202107-66", "reference_id": "ASA-202107-66", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-66" }, { "reference_url": "https://security.archlinux.org/AVG-2188", "reference_id": "AVG-2188", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2188" }, { "reference_url": "https://security.archlinux.org/AVG-2189", "reference_id": "AVG-2189", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2189" }, { "reference_url": "https://security.archlinux.org/AVG-2190", "reference_id": "AVG-2190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2190" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4946", "reference_id": "dsa-4946", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4946" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210723-0002/", "reference_id": "ntap-20210723-0002", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210723-0002/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2774", "reference_id": "RHSA-2021:2774", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2774" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2775", "reference_id": "RHSA-2021:2775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2776", "reference_id": "RHSA-2021:2776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2777", "reference_id": "RHSA-2021:2777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2778", "reference_id": "RHSA-2021:2778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2779", "reference_id": "RHSA-2021:2779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2780", "reference_id": "RHSA-2021:2780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2781", "reference_id": "RHSA-2021:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2782", "reference_id": "RHSA-2021:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2783", "reference_id": "RHSA-2021:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2784", "reference_id": "RHSA-2021:2784", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2845", "reference_id": "RHSA-2021:2845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3292", "reference_id": "RHSA-2021:3292", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3293", "reference_id": "RHSA-2021:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4089", "reference_id": "RHSA-2021:4089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4089" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-2369" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3b1m-995s-r7a8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34372?format=api", "vulnerability_id": "VCID-3hj5-z3ck-tkha", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041785", "reference_id": "2041785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041785" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5057", "reference_id": "dsa-5057", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5057" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5058", "reference_id": "dsa-5058", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5058" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21365" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hj5-z3ck-tkha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34370?format=api", "vulnerability_id": "VCID-4thy-7844-xuc9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041491", "reference_id": "2041491", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041491" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21360" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4thy-7844-xuc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34360?format=api", "vulnerability_id": "VCID-5xg6-kds9-g3hf", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041427", "reference_id": "2041427", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041427" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21294" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xg6-kds9-g3hf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34344?format=api", "vulnerability_id": "VCID-61c5-8468-33c8", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35925", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35997", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36023", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36146", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36061", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36055", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36031", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35982", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36116", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014508", "reference_id": "2014508", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014508" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/", "reference_id": "7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/", "reference_id": "DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5030", "reference_id": "RHSA-2021:5030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0310", "reference_id": "RHSA-2022:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0345", "reference_id": "RHSA-2022:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0345" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/", "reference_id": "V362B2BWTH5IJDL45QPQGMBKIQOG7JX5", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35565" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-61c5-8468-33c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34340?format=api", "vulnerability_id": "VCID-6wtu-f43b-1ue9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30596", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30602", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30647", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30654", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30781", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30732", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30687", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014518", "reference_id": "2014518", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014518" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/", "reference_id": "7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/", "reference_id": "DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5030", "reference_id": "RHSA-2021:5030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0310", "reference_id": "RHSA-2022:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0345", "reference_id": "RHSA-2022:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0345" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/", "reference_id": "V362B2BWTH5IJDL45QPQGMBKIQOG7JX5", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35559" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6wtu-f43b-1ue9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34348?format=api", "vulnerability_id": "VCID-6zn4-b8k4-3bcn", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37711", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37796", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37812", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37837", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37874", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37846", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37917", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015308", "reference_id": "2015308", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015308" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5030", "reference_id": "RHSA-2021:5030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0310", "reference_id": "RHSA-2022:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0345", "reference_id": "RHSA-2022:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0345" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35586" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6zn4-b8k4-3bcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34337?format=api", "vulnerability_id": "VCID-7jyy-8x35-wbba", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2432", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.4612", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.4616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46187", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.4618", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46185", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46206", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00233", "scoring_system": "epss", "scoring_elements": "0.46178", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2432" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994980", "reference_id": "1994980", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994980" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210723-0002/", "reference_id": "ntap-20210723-0002", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210723-0002/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3293", "reference_id": "RHSA-2021:3293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3293" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-2432" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyy-8x35-wbba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34346?format=api", "vulnerability_id": "VCID-97bv-kegv-uyd9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44539", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44618", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44617", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44576", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44628", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4463", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44647", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015658", "reference_id": "2015658", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015658" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35567" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-97bv-kegv-uyd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34368?format=api", "vulnerability_id": "VCID-98bc-5jrc-5kas", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041897", "reference_id": "2041897", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041897" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21341" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98bc-5jrc-5kas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34352?format=api", "vulnerability_id": "VCID-arwd-bvw4-gya1", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21271", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69192", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.6912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69151", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00589", "scoring_system": "epss", "scoring_elements": "0.69177", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21271" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21271" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-arwd-bvw4-gya1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34330?format=api", "vulnerability_id": "VCID-bqav-d2f9-x7d1", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80452", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80425", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80414", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80444", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80454", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80473", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01404", "scoring_system": "epss", "scoring_elements": "0.80458", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2161" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951231", "reference_id": "1951231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951231" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", "reference_id": "5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/" }, { "reference_url": "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures", "reference_id": "april-2021.html#fixed-common-vulnerabilities-and-exposures", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://docs.azul.com/core/zulu-openjdk/release-notes/april-2021.html#fixed-common-vulnerabilities-and-exposures" }, { "reference_url": "https://security.archlinux.org/AVG-1865", "reference_id": "AVG-1865", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1865" }, { "reference_url": "https://security.archlinux.org/AVG-1866", "reference_id": "AVG-1866", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1866" }, { "reference_url": "https://security.archlinux.org/AVG-1867", "reference_id": "AVG-1867", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1867" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", "reference_id": "CFXOKM2233JVGYDOWW77BN54X3GZTIBK", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", "reference_id": "CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4899", "reference_id": "dsa-4899", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4899" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", "reference_id": "MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", "reference_id": "MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210513-0001/", "reference_id": "ntap-20210513-0001", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210513-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1445", "reference_id": "RHSA-2021:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1447", "reference_id": "RHSA-2021:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1447" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", "reference_id": "UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-2161" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bqav-d2f9-x7d1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34369?format=api", "vulnerability_id": "VCID-cfyt-zw34-xbaz", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21349.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21349.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21349", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3028", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30425", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30286", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30333", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30374", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21349" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046273", "reference_id": "2046273", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046273" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21349" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfyt-zw34-xbaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34356?format=api", "vulnerability_id": "VCID-g2fj-4mgh-23fs", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30847", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32868", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32803", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32838", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041400", "reference_id": "2041400", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041400" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21283" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2fj-4mgh-23fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34339?format=api", "vulnerability_id": "VCID-gksn-mb6g-rue5", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33383", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.3341", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33437", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33471", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33433", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33392", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014515", "reference_id": "2014515", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014515" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5030", "reference_id": "RHSA-2021:5030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0310", "reference_id": "RHSA-2022:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0345", "reference_id": "RHSA-2022:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0345" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35556" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gksn-mb6g-rue5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34343?format=api", "vulnerability_id": "VCID-hdz7-kcy9-juah", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28773", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28867", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28948", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28898", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28822", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015061", "reference_id": "2015061", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015061" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/", "reference_id": "7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/", "reference_id": "DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5030", "reference_id": "RHSA-2021:5030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0310", "reference_id": "RHSA-2022:0310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0345", "reference_id": "RHSA-2022:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0345" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/", "reference_id": "V362B2BWTH5IJDL45QPQGMBKIQOG7JX5", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35564" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz7-kcy9-juah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34342?format=api", "vulnerability_id": "VCID-he8f-erpk-sqh8", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38981", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39168", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39189", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39163", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39192", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014524", "reference_id": "2014524", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014524" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/", "reference_id": "7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/", "reference_id": "DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4957", "reference_id": "RHSA-2022:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4959", "reference_id": "RHSA-2022:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5837", "reference_id": "RHSA-2022:5837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5837" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/", "reference_id": "V362B2BWTH5IJDL45QPQGMBKIQOG7JX5", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35561" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-he8f-erpk-sqh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34373?format=api", "vulnerability_id": "VCID-mumk-x95v-bfc8", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3747", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37445", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75391", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75412", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.7539", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75338", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75382", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21366" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041789", "reference_id": "2041789", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041789" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21366" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mumk-x95v-bfc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34354?format=api", "vulnerability_id": "VCID-ne6z-gg9f-qkcy", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33007", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33041", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3295", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32887", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041435", "reference_id": "2041435", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041435" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21282" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ne6z-gg9f-qkcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34350?format=api", "vulnerability_id": "VCID-p5ye-19wy-ayb8", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31435", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3157", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31477", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31485", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31613", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015311", "reference_id": "2015311", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015311" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35603" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ye-19wy-ayb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34362?format=api", "vulnerability_id": "VCID-rgbz-akft-f7e6", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33007", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.33041", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32918", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3295", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32887", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041439", "reference_id": "2041439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041439" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21296" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-akft-f7e6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34338?format=api", "vulnerability_id": "VCID-rmqx-pseh-q7a7", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23142", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23201", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23303", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23259", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23166", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015648", "reference_id": "2015648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015648" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/", "reference_id": "7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/", "reference_id": "DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/", "reference_id": "V362B2BWTH5IJDL45QPQGMBKIQOG7JX5", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35550" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmqx-pseh-q7a7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34365?format=api", "vulnerability_id": "VCID-shg1-t3nh-67hk", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45878", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.459", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.4587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45877", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041878", "reference_id": "2041878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041878" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21305" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-shg1-t3nh-67hk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34357?format=api", "vulnerability_id": "VCID-tna8-m3b1-nkhn", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32057", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32017", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32861", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32824", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32799", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32832", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041831", "reference_id": "2041831", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041831" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21291" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tna8-m3b1-nkhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34367?format=api", "vulnerability_id": "VCID-tr4r-wm4s-auej", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91031", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.9104", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91067", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041884", "reference_id": "2041884", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041884" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21340" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tr4r-wm4s-auej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34331?format=api", "vulnerability_id": "VCID-u9xe-x4f1-9fc8", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26911", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26795", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2695", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26986", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26777", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26846", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26896", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26852", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951217", "reference_id": "1951217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951217" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/", "reference_id": "5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/" }, { "reference_url": "https://security.archlinux.org/AVG-1847", "reference_id": "AVG-1847", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1847" }, { "reference_url": "https://security.archlinux.org/AVG-1848", "reference_id": "AVG-1848", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1848" }, { "reference_url": "https://security.archlinux.org/AVG-1849", "reference_id": "AVG-1849", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1849" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/", "reference_id": "CFXOKM2233JVGYDOWW77BN54X3GZTIBK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/", "reference_id": "CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4899", "reference_id": "dsa-4899", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4899" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/", "reference_id": "MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/", "reference_id": "MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210513-0001/", "reference_id": "ntap-20210513-0001", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210513-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1297", "reference_id": "RHSA-2021:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1298", "reference_id": "RHSA-2021:1298", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1298" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1299", "reference_id": "RHSA-2021:1299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1301", "reference_id": "RHSA-2021:1301", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1305", "reference_id": "RHSA-2021:1305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1306", "reference_id": "RHSA-2021:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1307", "reference_id": "RHSA-2021:1307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1315", "reference_id": "RHSA-2021:1315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1444", "reference_id": "RHSA-2021:1444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1445", "reference_id": "RHSA-2021:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1446", "reference_id": "RHSA-2021:1446", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1447", "reference_id": "RHSA-2021:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6735", "reference_id": "RHSA-2022:6735", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6735" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6755", "reference_id": "RHSA-2022:6755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6756", "reference_id": "RHSA-2022:6756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6756" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/", "reference_id": "UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/" }, { "reference_url": "https://usn.ubuntu.com/4892-1/", "reference_id": "USN-4892-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4892-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-2163" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u9xe-x4f1-9fc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34363?format=api", "vulnerability_id": "VCID-ws4h-edpn-nudd", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26898", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26933", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2672", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26841", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26739", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041472", "reference_id": "2041472", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041472" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4918", "reference_id": "RHSA-2022:4918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4919", "reference_id": "RHSA-2022:4919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4922", "reference_id": "RHSA-2022:4922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4922" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4957", "reference_id": "RHSA-2022:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21299" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-edpn-nudd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34336?format=api", "vulnerability_id": "VCID-wyfq-yjf2-c7dy", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2388", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74086", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74134", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.7414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74158", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74091", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74137", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74122", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983075", "reference_id": "1983075", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983075" }, { "reference_url": "https://security.archlinux.org/ASA-202107-53", "reference_id": "ASA-202107-53", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-53" }, { "reference_url": "https://security.archlinux.org/ASA-202107-54", "reference_id": "ASA-202107-54", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-54" }, { "reference_url": "https://security.archlinux.org/ASA-202107-65", "reference_id": "ASA-202107-65", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-65" }, { "reference_url": "https://security.archlinux.org/ASA-202107-66", "reference_id": "ASA-202107-66", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-66" }, { "reference_url": "https://security.archlinux.org/AVG-2188", "reference_id": "AVG-2188", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2188" }, { "reference_url": "https://security.archlinux.org/AVG-2189", "reference_id": "AVG-2189", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2189" }, { "reference_url": "https://security.archlinux.org/AVG-2190", "reference_id": "AVG-2190", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2190" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4946", "reference_id": "dsa-4946", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4946" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210723-0002/", "reference_id": "ntap-20210723-0002", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210723-0002/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2774", "reference_id": "RHSA-2021:2774", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2774" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2775", "reference_id": "RHSA-2021:2775", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2776", "reference_id": "RHSA-2021:2776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2777", "reference_id": "RHSA-2021:2777", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2778", "reference_id": "RHSA-2021:2778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2779", "reference_id": "RHSA-2021:2779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2780", "reference_id": "RHSA-2021:2780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2781", "reference_id": "RHSA-2021:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2782", "reference_id": "RHSA-2021:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2783", "reference_id": "RHSA-2021:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2784", "reference_id": "RHSA-2021:2784", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2845", "reference_id": "RHSA-2021:2845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2845" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-2388" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wyfq-yjf2-c7dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34351?format=api", "vulnerability_id": "VCID-xfqx-d3jw-yuhn", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24263", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2428", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24237", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041801", "reference_id": "2041801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041801" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/", "reference_id": "2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/", "reference_id": "4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5057", "reference_id": "dsa-5057", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5057" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5058", "reference_id": "dsa-5058", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5058" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/", "reference_id": "KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21248" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqx-d3jw-yuhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34347?format=api", "vulnerability_id": "VCID-yxk8-59zb-y7g2", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34672", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34732", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34758", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34635", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34707", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00144", "scoring_system": "epss", "scoring_elements": "0.34711", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015653", "reference_id": "2015653", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015653" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5030", "reference_id": "RHSA-2021:5030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0345", "reference_id": "RHSA-2022:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0345" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35578" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxk8-59zb-y7g2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34349?format=api", "vulnerability_id": "VCID-zb8p-5k26-5fc9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37016", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37193", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37221", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37053", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37104", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37116", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37092", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35588" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015659", "reference_id": "2015659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015659" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2021-35588" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zb8p-5k26-5fc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34353?format=api", "vulnerability_id": "VCID-ztx2-xh6v-nke1", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3747", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37445", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75391", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75412", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.7539", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75338", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75382", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041479", "reference_id": "2041479", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041479" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73709?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@8.322_p06", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }, { "url": "http://public2.vulnerablecode.io/api/packages/73710?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@11.0.14_p9" }, { "url": "http://public2.vulnerablecode.io/api/packages/73711?format=api", "purl": "pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@17.0.2_p8" } ], "aliases": [ "CVE-2022-21277" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztx2-xh6v-nke1" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/openjdk-bin@8.322_p06" }