Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-java/icedtea-bin@3.21.0
Typeebuild
Namespacedev-java
Nameicedtea-bin
Version3.21.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.1.13.3
Latest_non_vulnerable_version8.252_p09
Affected_by_vulnerabilities
0
url VCID-1pdg-7bbt-kqfz
vulnerability_id VCID-1pdg-7bbt-kqfz
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2341
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59239
published_at 2026-04-01T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-16T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59313
published_at 2026-04-02T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59337
published_at 2026-04-04T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59301
published_at 2026-04-07T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59352
published_at 2026-04-08T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59365
published_at 2026-04-09T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59384
published_at 2026-04-11T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59367
published_at 2026-04-12T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59349
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1982874
reference_id 1982874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1982874
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
reference_id A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
8
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
9
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
10
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
11
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
12
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
13
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
14
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
15
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://www.debian.org/security/2021/dsa-4946
16
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://security.gentoo.org/glsa/202209-05
17
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
18
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
reference_id N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
20
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
reference_id PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
22
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
23
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
24
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
25
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
26
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
27
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
28
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
29
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
30
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
31
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
32
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
33
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
34
reference_url https://access.redhat.com/errata/RHSA-2021:3292
reference_id RHSA-2021:3292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3292
35
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
36
reference_url https://access.redhat.com/errata/RHSA-2021:4089
reference_id RHSA-2021:4089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4089
37
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
reference_id VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
fixed_packages
aliases CVE-2021-2341
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pdg-7bbt-kqfz
1
url VCID-2znn-4qpa-6kbm
vulnerability_id VCID-2znn-4qpa-6kbm
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14664
reference_id
reference_type
scores
0
value 0.01068
scoring_system epss
scoring_elements 0.77658
published_at 2026-04-01T12:55:00Z
1
value 0.01068
scoring_system epss
scoring_elements 0.77665
published_at 2026-04-02T12:55:00Z
2
value 0.01068
scoring_system epss
scoring_elements 0.77754
published_at 2026-04-16T12:55:00Z
3
value 0.01068
scoring_system epss
scoring_elements 0.77692
published_at 2026-04-04T12:55:00Z
4
value 0.01068
scoring_system epss
scoring_elements 0.77675
published_at 2026-04-07T12:55:00Z
5
value 0.01068
scoring_system epss
scoring_elements 0.77703
published_at 2026-04-08T12:55:00Z
6
value 0.01068
scoring_system epss
scoring_elements 0.77707
published_at 2026-04-09T12:55:00Z
7
value 0.01068
scoring_system epss
scoring_elements 0.77734
published_at 2026-04-11T12:55:00Z
8
value 0.01068
scoring_system epss
scoring_elements 0.77718
published_at 2026-04-12T12:55:00Z
9
value 0.01068
scoring_system epss
scoring_elements 0.77717
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1866027
reference_id 1866027
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1866027
5
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/
url https://security.gentoo.org/glsa/202209-15
6
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
7
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-897/
reference_id ZDI-20-897
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-897/
fixed_packages
aliases CVE-2020-14664
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2znn-4qpa-6kbm
2
url VCID-3b1m-995s-r7a8
vulnerability_id VCID-3b1m-995s-r7a8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2369
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56676
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56819
published_at 2026-04-16T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56771
published_at 2026-04-02T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56791
published_at 2026-04-04T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56768
published_at 2026-04-07T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.5682
published_at 2026-04-08T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56824
published_at 2026-04-09T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56832
published_at 2026-04-11T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56809
published_at 2026-04-12T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56788
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2369
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1982879
reference_id 1982879
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1982879
7
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
8
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
9
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
10
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
11
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
12
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
13
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
14
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://www.debian.org/security/2021/dsa-4946
15
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://security.gentoo.org/glsa/202209-05
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
18
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
19
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
20
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
21
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
22
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
23
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
24
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
25
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
26
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
27
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
28
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
29
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
30
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
31
reference_url https://access.redhat.com/errata/RHSA-2021:3292
reference_id RHSA-2021:3292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3292
32
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
33
reference_url https://access.redhat.com/errata/RHSA-2021:4089
reference_id RHSA-2021:4089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4089
34
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-2369
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3b1m-995s-r7a8
3
url VCID-3tav-ffar-hfhb
vulnerability_id VCID-3tav-ffar-hfhb
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-02T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30591
published_at 2026-04-16T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30619
published_at 2026-04-08T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30653
published_at 2026-04-09T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30658
published_at 2026-04-11T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30613
published_at 2026-04-12T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30566
published_at 2026-04-13T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.3075
published_at 2026-04-04T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30561
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
reference_id 2160475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160475
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0203
reference_id RHSA-2023:0203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0203
27
reference_url https://access.redhat.com/errata/RHSA-2023:0204
reference_id RHSA-2023:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0204
28
reference_url https://access.redhat.com/errata/RHSA-2023:0205
reference_id RHSA-2023:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0205
29
reference_url https://access.redhat.com/errata/RHSA-2023:0206
reference_id RHSA-2023:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0206
30
reference_url https://access.redhat.com/errata/RHSA-2023:0207
reference_id RHSA-2023:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0207
31
reference_url https://access.redhat.com/errata/RHSA-2023:0208
reference_id RHSA-2023:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0208
32
reference_url https://access.redhat.com/errata/RHSA-2023:0209
reference_id RHSA-2023:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0209
33
reference_url https://access.redhat.com/errata/RHSA-2023:0210
reference_id RHSA-2023:0210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0210
34
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
35
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
36
reference_url https://access.redhat.com/errata/RHSA-2023:0354
reference_id RHSA-2023:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0354
37
reference_url https://access.redhat.com/errata/RHSA-2023:0387
reference_id RHSA-2023:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0387
38
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
39
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
40
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
41
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
42
reference_url https://usn.ubuntu.com/5898-1/
reference_id USN-5898-1
reference_type
scores
url https://usn.ubuntu.com/5898-1/
fixed_packages
aliases CVE-2023-21843
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tav-ffar-hfhb
4
url VCID-3v2y-qzfu-nydb
vulnerability_id VCID-3v2y-qzfu-nydb
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14779
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42142
published_at 2026-04-16T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42042
published_at 2026-04-01T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42102
published_at 2026-04-02T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42131
published_at 2026-04-09T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42068
published_at 2026-04-07T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42119
published_at 2026-04-08T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42152
published_at 2026-04-11T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42115
published_at 2026-04-12T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42091
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889271
reference_id 1889271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889271
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
reference_id N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
18
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
reference_id OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
20
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
21
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
22
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
23
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
24
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
25
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
26
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
27
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
28
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
29
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
30
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
31
reference_url https://access.redhat.com/errata/RHSA-2021:0530
reference_id RHSA-2021:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0530
32
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
33
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
reference_id XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
reference_id XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
reference_id YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
reference_id Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
fixed_packages
aliases CVE-2020-14779
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v2y-qzfu-nydb
5
url VCID-4trq-2j9e-bbfd
vulnerability_id VCID-4trq-2j9e-bbfd
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14577.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14577
reference_id
reference_type
scores
0
value 0.00283
scoring_system epss
scoring_elements 0.5174
published_at 2026-04-12T12:55:00Z
1
value 0.00283
scoring_system epss
scoring_elements 0.51762
published_at 2026-04-11T12:55:00Z
2
value 0.00283
scoring_system epss
scoring_elements 0.51713
published_at 2026-04-09T12:55:00Z
3
value 0.00283
scoring_system epss
scoring_elements 0.51677
published_at 2026-04-02T12:55:00Z
4
value 0.00283
scoring_system epss
scoring_elements 0.51626
published_at 2026-04-01T12:55:00Z
5
value 0.00283
scoring_system epss
scoring_elements 0.51717
published_at 2026-04-08T12:55:00Z
6
value 0.00283
scoring_system epss
scoring_elements 0.51764
published_at 2026-04-16T12:55:00Z
7
value 0.00283
scoring_system epss
scoring_elements 0.51724
published_at 2026-04-13T12:55:00Z
8
value 0.00283
scoring_system epss
scoring_elements 0.51663
published_at 2026-04-07T12:55:00Z
9
value 0.00283
scoring_system epss
scoring_elements 0.51702
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856988
reference_id 1856988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856988
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://security.gentoo.org/glsa/202209-15
18
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
21
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
24
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
26
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
27
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
28
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
29
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
30
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
31
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
32
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
33
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
34
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
35
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
36
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
37
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
38
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
39
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://usn.ubuntu.com/4433-1/
40
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
aliases CVE-2020-14577
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4trq-2j9e-bbfd
6
url VCID-61c5-8468-33c8
vulnerability_id VCID-61c5-8468-33c8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35565
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35925
published_at 2026-04-01T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36036
published_at 2026-04-16T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.35997
published_at 2026-04-13T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.35982
published_at 2026-04-07T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36061
published_at 2026-04-11T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36055
published_at 2026-04-09T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36031
published_at 2026-04-08T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36146
published_at 2026-04-04T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36116
published_at 2026-04-02T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36023
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014508
reference_id 2014508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014508
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
19
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://www.debian.org/security/2021/dsa-5000
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
38
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
39
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
aliases CVE-2021-35565
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-61c5-8468-33c8
7
url VCID-6wtu-f43b-1ue9
vulnerability_id VCID-6wtu-f43b-1ue9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35559
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30596
published_at 2026-04-07T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30602
published_at 2026-04-13T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30732
published_at 2026-04-02T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30627
published_at 2026-04-16T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30781
published_at 2026-04-04T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30654
published_at 2026-04-08T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30687
published_at 2026-04-09T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30692
published_at 2026-04-11T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30647
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014518
reference_id 2014518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014518
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
43
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
44
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
aliases CVE-2021-35559
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wtu-f43b-1ue9
8
url VCID-6zn4-b8k4-3bcn
vulnerability_id VCID-6zn4-b8k4-3bcn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35586
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37711
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37796
published_at 2026-04-07T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-02T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37812
published_at 2026-04-13T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37837
published_at 2026-04-12T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37874
published_at 2026-04-11T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37859
published_at 2026-04-16T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-08T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015308
reference_id 2015308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015308
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
41
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
42
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-35586
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6zn4-b8k4-3bcn
9
url VCID-7913-mqsn-3bd8
vulnerability_id VCID-7913-mqsn-3bd8
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14796.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14796.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14796
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32782
published_at 2026-04-16T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32743
published_at 2026-04-01T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32909
published_at 2026-04-04T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32729
published_at 2026-04-07T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32777
published_at 2026-04-08T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32803
published_at 2026-04-09T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32805
published_at 2026-04-11T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32767
published_at 2026-04-12T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32741
published_at 2026-04-13T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32874
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14796
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889697
reference_id 1889697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889697
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
28
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
29
reference_url https://access.redhat.com/errata/RHSA-2021:0530
reference_id RHSA-2021:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0530
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
aliases CVE-2020-14796
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7913-mqsn-3bd8
10
url VCID-7c1s-f99n-bfds
vulnerability_id VCID-7c1s-f99n-bfds
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14581.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14581
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59738
published_at 2026-04-11T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59719
published_at 2026-04-09T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59587
published_at 2026-04-01T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59654
published_at 2026-04-07T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59684
published_at 2026-04-04T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59706
published_at 2026-04-08T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.5966
published_at 2026-04-02T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.5974
published_at 2026-04-16T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59703
published_at 2026-04-13T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.59722
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1857172
reference_id 1857172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1857172
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://security.gentoo.org/glsa/202209-15
18
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
21
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
24
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
26
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://usn.ubuntu.com/4433-1/
27
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
aliases CVE-2020-14581
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7c1s-f99n-bfds
11
url VCID-7jyy-8x35-wbba
vulnerability_id VCID-7jyy-8x35-wbba
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2432
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.4612
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.4616
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46243
published_at 2026-04-16T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.4618
published_at 2026-04-04T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46128
published_at 2026-04-07T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46185
published_at 2026-04-08T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46183
published_at 2026-04-09T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46206
published_at 2026-04-11T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46178
published_at 2026-04-12T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46187
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2432
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1994980
reference_id 1994980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1994980
4
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/
url https://security.gentoo.org/glsa/202209-05
5
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
6
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:34Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3293
reference_id RHSA-2021:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3293
fixed_packages
aliases CVE-2021-2432
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyy-8x35-wbba
12
url VCID-97bv-kegv-uyd9
vulnerability_id VCID-97bv-kegv-uyd9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35567
reference_id
reference_type
scores
0
value 0.0022
scoring_system epss
scoring_elements 0.44539
published_at 2026-04-01T12:55:00Z
1
value 0.0022
scoring_system epss
scoring_elements 0.44673
published_at 2026-04-16T12:55:00Z
2
value 0.0022
scoring_system epss
scoring_elements 0.44617
published_at 2026-04-12T12:55:00Z
3
value 0.0022
scoring_system epss
scoring_elements 0.44638
published_at 2026-04-04T12:55:00Z
4
value 0.0022
scoring_system epss
scoring_elements 0.44576
published_at 2026-04-07T12:55:00Z
5
value 0.0022
scoring_system epss
scoring_elements 0.44628
published_at 2026-04-08T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.4463
published_at 2026-04-09T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44647
published_at 2026-04-11T12:55:00Z
8
value 0.0022
scoring_system epss
scoring_elements 0.44618
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015658
reference_id 2015658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015658
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-35567
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97bv-kegv-uyd9
13
url VCID-a3xk-3wya-s3gm
vulnerability_id VCID-a3xk-3wya-s3gm
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-02T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.2325
published_at 2026-04-04T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-07T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23112
published_at 2026-04-08T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23165
published_at 2026-04-09T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23185
published_at 2026-04-11T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23147
published_at 2026-04-12T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23089
published_at 2026-04-13T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23104
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
reference_id 2160421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160421
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2023:0190
reference_id RHSA-2023:0190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0190
14
reference_url https://access.redhat.com/errata/RHSA-2023:0191
reference_id RHSA-2023:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0191
15
reference_url https://access.redhat.com/errata/RHSA-2023:0192
reference_id RHSA-2023:0192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0192
16
reference_url https://access.redhat.com/errata/RHSA-2023:0193
reference_id RHSA-2023:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0193
17
reference_url https://access.redhat.com/errata/RHSA-2023:0194
reference_id RHSA-2023:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0194
18
reference_url https://access.redhat.com/errata/RHSA-2023:0195
reference_id RHSA-2023:0195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0195
19
reference_url https://access.redhat.com/errata/RHSA-2023:0196
reference_id RHSA-2023:0196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0196
20
reference_url https://access.redhat.com/errata/RHSA-2023:0197
reference_id RHSA-2023:0197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0197
21
reference_url https://access.redhat.com/errata/RHSA-2023:0198
reference_id RHSA-2023:0198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0198
22
reference_url https://access.redhat.com/errata/RHSA-2023:0199
reference_id RHSA-2023:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0199
23
reference_url https://access.redhat.com/errata/RHSA-2023:0200
reference_id RHSA-2023:0200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0200
24
reference_url https://access.redhat.com/errata/RHSA-2023:0201
reference_id RHSA-2023:0201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0201
25
reference_url https://access.redhat.com/errata/RHSA-2023:0202
reference_id RHSA-2023:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0202
26
reference_url https://access.redhat.com/errata/RHSA-2023:0352
reference_id RHSA-2023:0352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0352
27
reference_url https://access.redhat.com/errata/RHSA-2023:0353
reference_id RHSA-2023:0353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0353
28
reference_url https://access.redhat.com/errata/RHSA-2023:0388
reference_id RHSA-2023:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0388
29
reference_url https://access.redhat.com/errata/RHSA-2023:0389
reference_id RHSA-2023:0389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0389
30
reference_url https://usn.ubuntu.com/5897-1/
reference_id USN-5897-1
reference_type
scores
url https://usn.ubuntu.com/5897-1/
fixed_packages
aliases CVE-2023-21835
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3xk-3wya-s3gm
14
url VCID-d6wf-827v-a7c3
vulnerability_id VCID-d6wf-827v-a7c3
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14798.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14798
reference_id
reference_type
scores
0
value 0.00244
scoring_system epss
scoring_elements 0.4769
published_at 2026-04-16T12:55:00Z
1
value 0.00244
scoring_system epss
scoring_elements 0.47564
published_at 2026-04-01T12:55:00Z
2
value 0.00244
scoring_system epss
scoring_elements 0.47603
published_at 2026-04-02T12:55:00Z
3
value 0.00244
scoring_system epss
scoring_elements 0.47624
published_at 2026-04-12T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47573
published_at 2026-04-07T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.47628
published_at 2026-04-08T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47648
published_at 2026-04-11T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47633
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1891135
reference_id 1891135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1891135
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
19
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
aliases CVE-2020-14798
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6wf-827v-a7c3
15
url VCID-ecr4-rqud-gyhf
vulnerability_id VCID-ecr4-rqud-gyhf
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21830.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21830
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.3205
published_at 2026-04-02T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.3209
published_at 2026-04-04T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31913
published_at 2026-04-07T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31964
published_at 2026-04-08T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31993
published_at 2026-04-09T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31997
published_at 2026-04-11T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31957
published_at 2026-04-12T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31923
published_at 2026-04-13T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31956
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21830
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160490
reference_id 2160490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160490
4
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
5
reference_url https://access.redhat.com/errata/RHSA-2023:0203
reference_id RHSA-2023:0203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0203
6
reference_url https://access.redhat.com/errata/RHSA-2023:0204
reference_id RHSA-2023:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0204
7
reference_url https://access.redhat.com/errata/RHSA-2023:0205
reference_id RHSA-2023:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0205
8
reference_url https://access.redhat.com/errata/RHSA-2023:0206
reference_id RHSA-2023:0206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0206
9
reference_url https://access.redhat.com/errata/RHSA-2023:0207
reference_id RHSA-2023:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0207
10
reference_url https://access.redhat.com/errata/RHSA-2023:0208
reference_id RHSA-2023:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0208
11
reference_url https://access.redhat.com/errata/RHSA-2023:0209
reference_id RHSA-2023:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0209
12
reference_url https://access.redhat.com/errata/RHSA-2023:0210
reference_id RHSA-2023:0210
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0210
13
reference_url https://access.redhat.com/errata/RHSA-2023:0354
reference_id RHSA-2023:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0354
14
reference_url https://access.redhat.com/errata/RHSA-2023:0387
reference_id RHSA-2023:0387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0387
15
reference_url https://access.redhat.com/errata/RHSA-2023:3136
reference_id RHSA-2023:3136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3136
16
reference_url https://usn.ubuntu.com/5898-1/
reference_id USN-5898-1
reference_type
scores
url https://usn.ubuntu.com/5898-1/
fixed_packages
aliases CVE-2023-21830
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ecr4-rqud-gyhf
16
url VCID-fwv1-sj5y-xygd
vulnerability_id VCID-fwv1-sj5y-xygd
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21619
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49517
published_at 2026-04-02T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49544
published_at 2026-04-04T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49496
published_at 2026-04-07T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49551
published_at 2026-04-08T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49546
published_at 2026-04-09T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49563
published_at 2026-04-11T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49535
published_at 2026-04-12T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49537
published_at 2026-04-13T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49583
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21619
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133745
reference_id 2133745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133745
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
17
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
18
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
19
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
20
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
21
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
22
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
23
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
24
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
25
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
26
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
27
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
28
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
29
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
30
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
31
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
32
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
33
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
34
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
35
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
36
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
aliases CVE-2022-21619
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwv1-sj5y-xygd
17
url VCID-gfxx-m9ud-rybe
vulnerability_id VCID-gfxx-m9ud-rybe
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14562.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14562.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14562
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55613
published_at 2026-04-02T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.55679
published_at 2026-04-16T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55641
published_at 2026-04-13T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55659
published_at 2026-04-12T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55678
published_at 2026-04-11T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.5567
published_at 2026-04-09T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55666
published_at 2026-04-08T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55615
published_at 2026-04-07T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55638
published_at 2026-04-04T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.55501
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14562
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856810
reference_id 1856810
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856810
14
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://www.debian.org/security/2020/dsa-4734
15
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://security.gentoo.org/glsa/202008-24
16
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://security.gentoo.org/glsa/202209-15
17
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
19
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
21
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
23
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
24
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
25
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
26
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
27
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/
url https://usn.ubuntu.com/4433-1/
fixed_packages
aliases CVE-2020-14562
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfxx-m9ud-rybe
18
url VCID-gksn-mb6g-rue5
vulnerability_id VCID-gksn-mb6g-rue5
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35556
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33383
published_at 2026-04-01T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33446
published_at 2026-04-16T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33471
published_at 2026-04-09T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33474
published_at 2026-04-11T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33433
published_at 2026-04-12T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.3341
published_at 2026-04-13T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33519
published_at 2026-04-02T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33552
published_at 2026-04-04T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33392
published_at 2026-04-07T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33437
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014515
reference_id 2014515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014515
14
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
15
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
16
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
17
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
18
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
19
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
20
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
21
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
22
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
23
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
24
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
25
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
26
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
27
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
28
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
29
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
30
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
31
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
32
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
33
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
34
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
35
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
36
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
37
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-35556
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gksn-mb6g-rue5
19
url VCID-h2w2-8e43-j3g6
vulnerability_id VCID-h2w2-8e43-j3g6
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21624
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42206
published_at 2026-04-02T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-09T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42175
published_at 2026-04-07T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42226
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.4222
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42257
published_at 2026-04-11T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50242
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133765
reference_id 2133765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133765
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
17
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
18
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
19
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
20
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
21
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
22
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
23
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
24
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
25
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
26
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
27
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
28
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
29
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
30
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
31
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
32
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
33
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
34
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
35
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
36
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
aliases CVE-2022-21624
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2w2-8e43-j3g6
20
url VCID-hdz7-kcy9-juah
vulnerability_id VCID-hdz7-kcy9-juah
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35564
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28817
published_at 2026-04-01T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28793
published_at 2026-04-16T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28773
published_at 2026-04-13T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-11T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28755
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28948
published_at 2026-04-04T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28898
published_at 2026-04-02T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28862
published_at 2026-04-09T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28822
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015061
reference_id 2015061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015061
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
43
reference_url https://access.redhat.com/errata/RHSA-2022:0310
reference_id RHSA-2022:0310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0310
44
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
aliases CVE-2021-35564
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz7-kcy9-juah
21
url VCID-he8f-erpk-sqh8
vulnerability_id VCID-he8f-erpk-sqh8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38981
published_at 2026-04-01T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39136
published_at 2026-04-13T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.3919
published_at 2026-04-16T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39189
published_at 2026-04-04T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-07T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-08T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.3918
published_at 2026-04-09T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39192
published_at 2026-04-11T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39155
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
reference_id 2014524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
43
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
44
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
aliases CVE-2021-35561
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he8f-erpk-sqh8
22
url VCID-jc9v-4116-4yas
vulnerability_id VCID-jc9v-4116-4yas
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14781.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14781
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27925
published_at 2026-04-16T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27995
published_at 2026-04-01T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.28067
published_at 2026-04-02T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.28109
published_at 2026-04-04T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27904
published_at 2026-04-07T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27971
published_at 2026-04-08T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.28012
published_at 2026-04-09T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.28015
published_at 2026-04-11T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27973
published_at 2026-04-12T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27914
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889274
reference_id 1889274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889274
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
28
reference_url https://access.redhat.com/errata/RHSA-2021:0717
reference_id RHSA-2021:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0717
29
reference_url https://access.redhat.com/errata/RHSA-2021:0736
reference_id RHSA-2021:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0736
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
aliases CVE-2020-14781
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jc9v-4116-4yas
23
url VCID-jm9f-9y4b-qye7
vulnerability_id VCID-jm9f-9y4b-qye7
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39399
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.52035
published_at 2026-04-02T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52061
published_at 2026-04-04T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52027
published_at 2026-04-07T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52081
published_at 2026-04-08T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52077
published_at 2026-04-09T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52129
published_at 2026-04-11T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52113
published_at 2026-04-12T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52098
published_at 2026-04-13T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52138
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39399
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133776
reference_id 2133776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133776
12
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
13
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
14
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
15
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
16
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
17
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
18
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
19
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
20
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
21
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
22
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
23
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
24
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
25
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
26
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
aliases CVE-2022-39399
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jm9f-9y4b-qye7
24
url VCID-k3xn-hbrs-nkab
vulnerability_id VCID-k3xn-hbrs-nkab
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14583.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14583
reference_id
reference_type
scores
0
value 0.01018
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-11T12:55:00Z
1
value 0.01018
scoring_system epss
scoring_elements 0.77205
published_at 2026-04-09T12:55:00Z
2
value 0.01018
scoring_system epss
scoring_elements 0.77197
published_at 2026-04-08T12:55:00Z
3
value 0.01018
scoring_system epss
scoring_elements 0.77164
published_at 2026-04-07T12:55:00Z
4
value 0.01018
scoring_system epss
scoring_elements 0.77182
published_at 2026-04-04T12:55:00Z
5
value 0.01018
scoring_system epss
scoring_elements 0.77146
published_at 2026-04-01T12:55:00Z
6
value 0.01018
scoring_system epss
scoring_elements 0.77248
published_at 2026-04-16T12:55:00Z
7
value 0.01018
scoring_system epss
scoring_elements 0.77208
published_at 2026-04-13T12:55:00Z
8
value 0.01018
scoring_system epss
scoring_elements 0.77212
published_at 2026-04-12T12:55:00Z
9
value 0.01018
scoring_system epss
scoring_elements 0.77153
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14583
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856448
reference_id 1856448
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856448
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
22
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
25
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
27
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
28
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
29
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
30
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
31
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
32
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
33
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
34
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
35
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
36
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
37
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
38
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
39
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
40
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://usn.ubuntu.com/4433-1/
41
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
aliases CVE-2020-14583
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3xn-hbrs-nkab
25
url VCID-m3e1-5tfw-uyhv
vulnerability_id VCID-m3e1-5tfw-uyhv
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21618.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21618
reference_id
reference_type
scores
0
value 0.00292
scoring_system epss
scoring_elements 0.52551
published_at 2026-04-02T12:55:00Z
1
value 0.00292
scoring_system epss
scoring_elements 0.52577
published_at 2026-04-04T12:55:00Z
2
value 0.00292
scoring_system epss
scoring_elements 0.52544
published_at 2026-04-07T12:55:00Z
3
value 0.00292
scoring_system epss
scoring_elements 0.52595
published_at 2026-04-08T12:55:00Z
4
value 0.00292
scoring_system epss
scoring_elements 0.52589
published_at 2026-04-09T12:55:00Z
5
value 0.00292
scoring_system epss
scoring_elements 0.52639
published_at 2026-04-11T12:55:00Z
6
value 0.00292
scoring_system epss
scoring_elements 0.52623
published_at 2026-04-12T12:55:00Z
7
value 0.00292
scoring_system epss
scoring_elements 0.52609
published_at 2026-04-13T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.52648
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21618
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133817
reference_id 2133817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133817
11
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
12
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
13
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
14
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
15
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
16
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
17
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
18
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
19
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
20
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
21
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
22
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
23
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
24
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
25
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
aliases CVE-2022-21618
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3e1-5tfw-uyhv
26
url VCID-m3j8-8gff-6fg4
vulnerability_id VCID-m3j8-8gff-6fg4
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14792.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14792
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40489
published_at 2026-04-16T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.4038
published_at 2026-04-01T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40493
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-07T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40466
published_at 2026-04-08T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40477
published_at 2026-04-09T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40498
published_at 2026-04-11T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40461
published_at 2026-04-12T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40442
published_at 2026-04-13T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889280
reference_id 1889280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889280
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
28
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
aliases CVE-2020-14792
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3j8-8gff-6fg4
27
url VCID-mh6k-v939-m7hj
vulnerability_id VCID-mh6k-v939-m7hj
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14803.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14803
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12135
published_at 2026-04-16T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12319
published_at 2026-04-11T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12218
published_at 2026-04-01T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12333
published_at 2026-04-02T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12245
published_at 2026-04-13T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12379
published_at 2026-04-04T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12181
published_at 2026-04-07T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12261
published_at 2026-04-08T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12311
published_at 2026-04-09T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12283
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14803
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889895
reference_id 1889895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889895
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2021:0717
reference_id RHSA-2021:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0717
28
reference_url https://access.redhat.com/errata/RHSA-2021:0733
reference_id RHSA-2021:0733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0733
29
reference_url https://access.redhat.com/errata/RHSA-2021:0736
reference_id RHSA-2021:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0736
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
aliases CVE-2020-14803
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mh6k-v939-m7hj
28
url VCID-p5ye-19wy-ayb8
vulnerability_id VCID-p5ye-19wy-ayb8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31435
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31485
published_at 2026-04-08T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.3157
published_at 2026-04-02T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31474
published_at 2026-04-16T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.3144
published_at 2026-04-13T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-12T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31514
published_at 2026-04-09T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31613
published_at 2026-04-04T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31432
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
reference_id 2015311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
41
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
42
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-35603
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ye-19wy-ayb8
29
url VCID-rmqx-pseh-q7a7
vulnerability_id VCID-rmqx-pseh-q7a7
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35550
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23084
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23159
published_at 2026-04-16T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23142
published_at 2026-04-13T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23092
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23217
published_at 2026-04-09T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23166
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23303
published_at 2026-04-04T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-02T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23201
published_at 2026-04-12T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23238
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35550
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015648
reference_id 2015648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015648
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
19
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://www.debian.org/security/2021/dsa-5000
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
aliases CVE-2021-35550
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmqx-pseh-q7a7
30
url VCID-rpdj-d7je-47cs
vulnerability_id VCID-rpdj-d7je-47cs
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14573.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14573
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59774
published_at 2026-04-16T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59693
published_at 2026-04-02T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59621
published_at 2026-04-01T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59717
published_at 2026-04-04T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59687
published_at 2026-04-07T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59739
published_at 2026-04-08T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59752
published_at 2026-04-09T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.59771
published_at 2026-04-11T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59756
published_at 2026-04-12T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.59737
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856951
reference_id 1856951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856951
14
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://www.debian.org/security/2020/dsa-4734
15
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://security.gentoo.org/glsa/202008-24
16
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://security.gentoo.org/glsa/202209-15
17
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
19
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
21
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
23
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
24
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
25
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
26
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
27
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/
url https://usn.ubuntu.com/4433-1/
fixed_packages
aliases CVE-2020-14573
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpdj-d7je-47cs
31
url VCID-t5sp-ea5b-f7af
vulnerability_id VCID-t5sp-ea5b-f7af
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21626.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21626
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47467
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47488
published_at 2026-04-04T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47437
published_at 2026-04-07T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47492
published_at 2026-04-08T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.4749
published_at 2026-04-09T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47511
published_at 2026-04-11T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47487
published_at 2026-04-12T12:55:00Z
7
value 0.00242
scoring_system epss
scoring_elements 0.47494
published_at 2026-04-13T12:55:00Z
8
value 0.00242
scoring_system epss
scoring_elements 0.47554
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133753
reference_id 2133753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133753
11
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
12
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
13
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
14
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
15
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
16
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
17
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
18
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
19
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
20
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
21
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
22
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
23
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
24
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
25
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
26
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
27
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
28
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
29
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
30
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
31
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
32
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
33
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
34
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
35
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
aliases CVE-2022-21626
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5sp-ea5b-f7af
32
url VCID-tekc-e66p-tyba
vulnerability_id VCID-tekc-e66p-tyba
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14556.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14556
reference_id
reference_type
scores
0
value 0.00576
scoring_system epss
scoring_elements 0.68825
published_at 2026-04-12T12:55:00Z
1
value 0.00576
scoring_system epss
scoring_elements 0.68839
published_at 2026-04-11T12:55:00Z
2
value 0.00576
scoring_system epss
scoring_elements 0.68816
published_at 2026-04-09T12:55:00Z
3
value 0.00576
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-07T12:55:00Z
4
value 0.00576
scoring_system epss
scoring_elements 0.68768
published_at 2026-04-04T12:55:00Z
5
value 0.00576
scoring_system epss
scoring_elements 0.68797
published_at 2026-04-08T12:55:00Z
6
value 0.00576
scoring_system epss
scoring_elements 0.68747
published_at 2026-04-02T12:55:00Z
7
value 0.00576
scoring_system epss
scoring_elements 0.68837
published_at 2026-04-16T12:55:00Z
8
value 0.00576
scoring_system epss
scoring_elements 0.68796
published_at 2026-04-13T12:55:00Z
9
value 0.00576
scoring_system epss
scoring_elements 0.68728
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856896
reference_id 1856896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856896
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
22
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
25
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
27
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
28
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
29
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
30
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
31
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
32
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
33
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
34
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
35
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
36
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
37
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
38
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://usn.ubuntu.com/4433-1/
39
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
aliases CVE-2020-14556
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tekc-e66p-tyba
33
url VCID-tpng-ppye-m7hv
vulnerability_id VCID-tpng-ppye-m7hv
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14579.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14579.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14579
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36701
published_at 2026-04-16T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36617
published_at 2026-04-01T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36773
published_at 2026-04-02T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36804
published_at 2026-04-04T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.3664
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36691
published_at 2026-04-08T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36708
published_at 2026-04-09T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36717
published_at 2026-04-11T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36682
published_at 2026-04-12T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36656
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14579
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856995
reference_id 1856995
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856995
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
22
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
23
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
24
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
25
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
26
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
27
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
28
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
29
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
30
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
31
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
32
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
aliases CVE-2020-14579
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tpng-ppye-m7hv
34
url VCID-um54-6ggz-gqf9
vulnerability_id VCID-um54-6ggz-gqf9
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21628
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48077
published_at 2026-04-02T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48105
published_at 2026-04-13T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48094
published_at 2026-04-12T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48119
published_at 2026-04-11T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.48096
published_at 2026-04-09T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-08T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48098
published_at 2026-04-04T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48048
published_at 2026-04-07T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.60977
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133769
reference_id 2133769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133769
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
reference_id 37QDWJBGEPP65X43NXQTXQ7KASLUHON6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
reference_id 3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
reference_id 3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
reference_id EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
reference_id HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
18
reference_url https://security.netapp.com/advisory/ntap-20221028-0012/
reference_id ntap-20221028-0012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://security.netapp.com/advisory/ntap-20221028-0012/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
reference_id PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
20
reference_url https://access.redhat.com/errata/RHSA-2022:6999
reference_id RHSA-2022:6999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6999
21
reference_url https://access.redhat.com/errata/RHSA-2022:7000
reference_id RHSA-2022:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7000
22
reference_url https://access.redhat.com/errata/RHSA-2022:7001
reference_id RHSA-2022:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7001
23
reference_url https://access.redhat.com/errata/RHSA-2022:7002
reference_id RHSA-2022:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7002
24
reference_url https://access.redhat.com/errata/RHSA-2022:7003
reference_id RHSA-2022:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7003
25
reference_url https://access.redhat.com/errata/RHSA-2022:7004
reference_id RHSA-2022:7004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7004
26
reference_url https://access.redhat.com/errata/RHSA-2022:7005
reference_id RHSA-2022:7005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7005
27
reference_url https://access.redhat.com/errata/RHSA-2022:7006
reference_id RHSA-2022:7006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7006
28
reference_url https://access.redhat.com/errata/RHSA-2022:7007
reference_id RHSA-2022:7007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7007
29
reference_url https://access.redhat.com/errata/RHSA-2022:7008
reference_id RHSA-2022:7008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7008
30
reference_url https://access.redhat.com/errata/RHSA-2022:7009
reference_id RHSA-2022:7009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7009
31
reference_url https://access.redhat.com/errata/RHSA-2022:7010
reference_id RHSA-2022:7010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7010
32
reference_url https://access.redhat.com/errata/RHSA-2022:7011
reference_id RHSA-2022:7011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7011
33
reference_url https://access.redhat.com/errata/RHSA-2022:7012
reference_id RHSA-2022:7012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7012
34
reference_url https://access.redhat.com/errata/RHSA-2022:7013
reference_id RHSA-2022:7013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7013
35
reference_url https://access.redhat.com/errata/RHSA-2022:7049
reference_id RHSA-2022:7049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7049
36
reference_url https://access.redhat.com/errata/RHSA-2022:7050
reference_id RHSA-2022:7050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7050
37
reference_url https://access.redhat.com/errata/RHSA-2022:7051
reference_id RHSA-2022:7051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7051
38
reference_url https://access.redhat.com/errata/RHSA-2022:7052
reference_id RHSA-2022:7052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7052
39
reference_url https://access.redhat.com/errata/RHSA-2022:7053
reference_id RHSA-2022:7053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7053
40
reference_url https://access.redhat.com/errata/RHSA-2022:7054
reference_id RHSA-2022:7054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7054
41
reference_url https://access.redhat.com/errata/RHSA-2022:8880
reference_id RHSA-2022:8880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8880
42
reference_url https://access.redhat.com/errata/RHSA-2023:0128
reference_id RHSA-2023:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0128
43
reference_url https://usn.ubuntu.com/5719-1/
reference_id USN-5719-1
reference_type
scores
url https://usn.ubuntu.com/5719-1/
fixed_packages
aliases CVE-2022-21628
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-um54-6ggz-gqf9
35
url VCID-upb2-1jmf-3udy
vulnerability_id VCID-upb2-1jmf-3udy
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14797.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14797
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35735
published_at 2026-04-16T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35582
published_at 2026-04-01T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35778
published_at 2026-04-02T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35805
published_at 2026-04-04T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35685
published_at 2026-04-07T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35731
published_at 2026-04-08T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35754
published_at 2026-04-09T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35763
published_at 2026-04-11T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35718
published_at 2026-04-12T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35695
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14797
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889717
reference_id 1889717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889717
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
28
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
29
reference_url https://access.redhat.com/errata/RHSA-2021:0530
reference_id RHSA-2021:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0530
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
aliases CVE-2020-14797
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upb2-1jmf-3udy
36
url VCID-vssb-tgq1-p3g8
vulnerability_id VCID-vssb-tgq1-p3g8
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14782.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14782
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34801
published_at 2026-04-16T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34634
published_at 2026-04-01T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34876
published_at 2026-04-04T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34751
published_at 2026-04-07T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34795
published_at 2026-04-08T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34824
published_at 2026-04-09T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34829
published_at 2026-04-11T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34791
published_at 2026-04-12T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34766
published_at 2026-04-13T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.34849
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889290
reference_id 1889290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889290
12
reference_url https://www.debian.org/security/2020/dsa-4779
reference_id dsa-4779
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url https://www.debian.org/security/2020/dsa-4779
13
reference_url https://security.gentoo.org/glsa/202101-19
reference_id GLSA-202101-19
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url https://security.gentoo.org/glsa/202101-19
14
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
15
reference_url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
17
reference_url https://security.netapp.com/advisory/ntap-20201023-0004/
reference_id ntap-20201023-0004
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/
url https://security.netapp.com/advisory/ntap-20201023-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2020:4305
reference_id RHSA-2020:4305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4305
19
reference_url https://access.redhat.com/errata/RHSA-2020:4306
reference_id RHSA-2020:4306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4306
20
reference_url https://access.redhat.com/errata/RHSA-2020:4307
reference_id RHSA-2020:4307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4307
21
reference_url https://access.redhat.com/errata/RHSA-2020:4316
reference_id RHSA-2020:4316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4316
22
reference_url https://access.redhat.com/errata/RHSA-2020:4347
reference_id RHSA-2020:4347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4347
23
reference_url https://access.redhat.com/errata/RHSA-2020:4348
reference_id RHSA-2020:4348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4348
24
reference_url https://access.redhat.com/errata/RHSA-2020:4349
reference_id RHSA-2020:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4349
25
reference_url https://access.redhat.com/errata/RHSA-2020:4350
reference_id RHSA-2020:4350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4350
26
reference_url https://access.redhat.com/errata/RHSA-2020:4352
reference_id RHSA-2020:4352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4352
27
reference_url https://access.redhat.com/errata/RHSA-2020:5586
reference_id RHSA-2020:5586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5586
28
reference_url https://access.redhat.com/errata/RHSA-2021:0717
reference_id RHSA-2021:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0717
29
reference_url https://access.redhat.com/errata/RHSA-2021:0736
reference_id RHSA-2021:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0736
30
reference_url https://usn.ubuntu.com/4607-1/
reference_id USN-4607-1
reference_type
scores
url https://usn.ubuntu.com/4607-1/
31
reference_url https://usn.ubuntu.com/4607-2/
reference_id USN-4607-2
reference_type
scores
url https://usn.ubuntu.com/4607-2/
fixed_packages
aliases CVE-2020-14782
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vssb-tgq1-p3g8
37
url VCID-wfjr-ddp6-mkd5
vulnerability_id VCID-wfjr-ddp6-mkd5
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14621.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14621
reference_id
reference_type
scores
0
value 0.00461
scoring_system epss
scoring_elements 0.64149
published_at 2026-04-08T12:55:00Z
1
value 0.00461
scoring_system epss
scoring_elements 0.64098
published_at 2026-04-07T12:55:00Z
2
value 0.00461
scoring_system epss
scoring_elements 0.64139
published_at 2026-04-04T12:55:00Z
3
value 0.00461
scoring_system epss
scoring_elements 0.64165
published_at 2026-04-09T12:55:00Z
4
value 0.00461
scoring_system epss
scoring_elements 0.64055
published_at 2026-04-01T12:55:00Z
5
value 0.00461
scoring_system epss
scoring_elements 0.64112
published_at 2026-04-02T12:55:00Z
6
value 0.00461
scoring_system epss
scoring_elements 0.64174
published_at 2026-04-16T12:55:00Z
7
value 0.00461
scoring_system epss
scoring_elements 0.64138
published_at 2026-04-13T12:55:00Z
8
value 0.00461
scoring_system epss
scoring_elements 0.64166
published_at 2026-04-12T12:55:00Z
9
value 0.00461
scoring_system epss
scoring_elements 0.64177
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14621
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856885
reference_id 1856885
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856885
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
22
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
25
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
27
reference_url https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E
reference_id rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E
28
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
29
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
30
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
31
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
32
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
33
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
34
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
35
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
36
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
37
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
38
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
39
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
40
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
41
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://usn.ubuntu.com/4433-1/
42
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
aliases CVE-2020-14621
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfjr-ddp6-mkd5
38
url VCID-wyfq-yjf2-c7dy
vulnerability_id VCID-wyfq-yjf2-c7dy
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2388
reference_id
reference_type
scores
0
value 0.00805
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-01T12:55:00Z
1
value 0.00805
scoring_system epss
scoring_elements 0.74172
published_at 2026-04-16T12:55:00Z
2
value 0.00805
scoring_system epss
scoring_elements 0.74134
published_at 2026-04-13T12:55:00Z
3
value 0.00805
scoring_system epss
scoring_elements 0.7414
published_at 2026-04-12T12:55:00Z
4
value 0.00805
scoring_system epss
scoring_elements 0.74118
published_at 2026-04-04T12:55:00Z
5
value 0.00805
scoring_system epss
scoring_elements 0.74091
published_at 2026-04-02T12:55:00Z
6
value 0.00805
scoring_system epss
scoring_elements 0.74158
published_at 2026-04-11T12:55:00Z
7
value 0.00805
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-09T12:55:00Z
8
value 0.00805
scoring_system epss
scoring_elements 0.74089
published_at 2026-04-07T12:55:00Z
9
value 0.00805
scoring_system epss
scoring_elements 0.74122
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1983075
reference_id 1983075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1983075
7
reference_url https://security.archlinux.org/ASA-202107-53
reference_id ASA-202107-53
reference_type
scores
url https://security.archlinux.org/ASA-202107-53
8
reference_url https://security.archlinux.org/ASA-202107-54
reference_id ASA-202107-54
reference_type
scores
url https://security.archlinux.org/ASA-202107-54
9
reference_url https://security.archlinux.org/ASA-202107-65
reference_id ASA-202107-65
reference_type
scores
url https://security.archlinux.org/ASA-202107-65
10
reference_url https://security.archlinux.org/ASA-202107-66
reference_id ASA-202107-66
reference_type
scores
url https://security.archlinux.org/ASA-202107-66
11
reference_url https://security.archlinux.org/AVG-2188
reference_id AVG-2188
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2188
12
reference_url https://security.archlinux.org/AVG-2189
reference_id AVG-2189
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2189
13
reference_url https://security.archlinux.org/AVG-2190
reference_id AVG-2190
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2190
14
reference_url https://www.debian.org/security/2021/dsa-4946
reference_id dsa-4946
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://www.debian.org/security/2021/dsa-4946
15
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://security.gentoo.org/glsa/202209-05
16
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
17
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
18
reference_url https://security.netapp.com/advisory/ntap-20210723-0002/
reference_id ntap-20210723-0002
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/
url https://security.netapp.com/advisory/ntap-20210723-0002/
19
reference_url https://access.redhat.com/errata/RHSA-2021:2774
reference_id RHSA-2021:2774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2774
20
reference_url https://access.redhat.com/errata/RHSA-2021:2775
reference_id RHSA-2021:2775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2775
21
reference_url https://access.redhat.com/errata/RHSA-2021:2776
reference_id RHSA-2021:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2776
22
reference_url https://access.redhat.com/errata/RHSA-2021:2777
reference_id RHSA-2021:2777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2777
23
reference_url https://access.redhat.com/errata/RHSA-2021:2778
reference_id RHSA-2021:2778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2778
24
reference_url https://access.redhat.com/errata/RHSA-2021:2779
reference_id RHSA-2021:2779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2779
25
reference_url https://access.redhat.com/errata/RHSA-2021:2780
reference_id RHSA-2021:2780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2780
26
reference_url https://access.redhat.com/errata/RHSA-2021:2781
reference_id RHSA-2021:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2781
27
reference_url https://access.redhat.com/errata/RHSA-2021:2782
reference_id RHSA-2021:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2782
28
reference_url https://access.redhat.com/errata/RHSA-2021:2783
reference_id RHSA-2021:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2783
29
reference_url https://access.redhat.com/errata/RHSA-2021:2784
reference_id RHSA-2021:2784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2784
30
reference_url https://access.redhat.com/errata/RHSA-2021:2845
reference_id RHSA-2021:2845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2845
31
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-2388
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyfq-yjf2-c7dy
39
url VCID-y8wp-rpgd-kfht
vulnerability_id VCID-y8wp-rpgd-kfht
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14578.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14578.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14578
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36701
published_at 2026-04-16T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36617
published_at 2026-04-01T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36773
published_at 2026-04-02T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36804
published_at 2026-04-04T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.3664
published_at 2026-04-07T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36691
published_at 2026-04-08T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36708
published_at 2026-04-09T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36717
published_at 2026-04-11T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36682
published_at 2026-04-12T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36656
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14578
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856991
reference_id 1856991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856991
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
22
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
23
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
24
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
25
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
26
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
27
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
28
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
29
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
30
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
31
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
32
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
aliases CVE-2020-14578
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8wp-rpgd-kfht
40
url VCID-yqsu-y2mw-pqgt
vulnerability_id VCID-yqsu-y2mw-pqgt
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14593.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14593
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.61258
published_at 2026-04-11T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61238
published_at 2026-04-09T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61223
published_at 2026-04-08T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61175
published_at 2026-04-07T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61209
published_at 2026-04-04T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.61103
published_at 2026-04-01T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.61265
published_at 2026-04-16T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61226
published_at 2026-04-13T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61245
published_at 2026-04-12T12:55:00Z
9
value 0.00409
scoring_system epss
scoring_elements 0.61181
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14593
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856784
reference_id 1856784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856784
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
reference_id 6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
reference_id DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
16
reference_url https://www.debian.org/security/2020/dsa-4734
reference_id dsa-4734
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://www.debian.org/security/2020/dsa-4734
17
reference_url https://security.gentoo.org/glsa/202008-24
reference_id GLSA-202008-24
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://security.gentoo.org/glsa/202008-24
18
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://security.gentoo.org/glsa/202209-15
19
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
reference_id MEPHBZPNSLX43B26DWKB7OS6AROTS2BO
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
22
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
25
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
reference_id QQUMIAON2YEFRONMIUVHAKYCIOLICDBA
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
27
reference_url https://access.redhat.com/errata/RHSA-2020:2968
reference_id RHSA-2020:2968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2968
28
reference_url https://access.redhat.com/errata/RHSA-2020:2969
reference_id RHSA-2020:2969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2969
29
reference_url https://access.redhat.com/errata/RHSA-2020:2970
reference_id RHSA-2020:2970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2970
30
reference_url https://access.redhat.com/errata/RHSA-2020:2972
reference_id RHSA-2020:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2972
31
reference_url https://access.redhat.com/errata/RHSA-2020:2985
reference_id RHSA-2020:2985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2985
32
reference_url https://access.redhat.com/errata/RHSA-2020:3098
reference_id RHSA-2020:3098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3098
33
reference_url https://access.redhat.com/errata/RHSA-2020:3099
reference_id RHSA-2020:3099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3099
34
reference_url https://access.redhat.com/errata/RHSA-2020:3100
reference_id RHSA-2020:3100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3100
35
reference_url https://access.redhat.com/errata/RHSA-2020:3101
reference_id RHSA-2020:3101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3101
36
reference_url https://access.redhat.com/errata/RHSA-2020:3386
reference_id RHSA-2020:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3386
37
reference_url https://access.redhat.com/errata/RHSA-2020:3387
reference_id RHSA-2020:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3387
38
reference_url https://access.redhat.com/errata/RHSA-2020:3388
reference_id RHSA-2020:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3388
39
reference_url https://access.redhat.com/errata/RHSA-2020:5585
reference_id RHSA-2020:5585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5585
40
reference_url https://usn.ubuntu.com/4433-1/
reference_id USN-4433-1
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://usn.ubuntu.com/4433-1/
41
reference_url https://usn.ubuntu.com/4453-1/
reference_id USN-4453-1
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/
url https://usn.ubuntu.com/4453-1/
fixed_packages
aliases CVE-2020-14593
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqsu-y2mw-pqgt
41
url VCID-yxk8-59zb-y7g2
vulnerability_id VCID-yxk8-59zb-y7g2
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35578
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34514
published_at 2026-04-01T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34648
published_at 2026-04-13T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-02T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34685
published_at 2026-04-16T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34758
published_at 2026-04-04T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34635
published_at 2026-04-07T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-08T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-09T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-11T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35578
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015653
reference_id 2015653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015653
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2021:5030
reference_id RHSA-2021:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5030
41
reference_url https://access.redhat.com/errata/RHSA-2022:0345
reference_id RHSA-2022:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0345
42
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-35578
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxk8-59zb-y7g2
42
url VCID-zb8p-5k26-5fc9
vulnerability_id VCID-zb8p-5k26-5fc9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35588
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37016
published_at 2026-04-01T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37111
published_at 2026-04-16T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37193
published_at 2026-04-02T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37221
published_at 2026-04-04T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37053
published_at 2026-04-07T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37104
published_at 2026-04-08T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37116
published_at 2026-04-09T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37126
published_at 2026-04-11T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37092
published_at 2026-04-12T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37065
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35588
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015659
reference_id 2015659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015659
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
5
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
6
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://security.gentoo.org/glsa/202209-05
7
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
10
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:11:40Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
11
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
12
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
13
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
14
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
15
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
16
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
17
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-35588
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb8p-5k26-5fc9
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.21.0