Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/933556?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/933556?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.1%2B13-1?distro=sid", "type": "deb", "namespace": "debian", "name": "openjdk-11", "version": "11.0.1+13-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "11.0.2+9-1", "latest_non_vulnerable_version": "11.0.31+11-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50791?format=api", "vulnerability_id": "VCID-4c6b-h8rq-3fa4", "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n software suites.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3150.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3150.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73702", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73825", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73693", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73768", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.7375", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73741", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73783", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73791", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73782", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73816", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73726", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73733", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73746", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3150" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/105597", "reference_id": "105597", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:56Z/" } ], "url": "http://www.securityfocus.com/bid/105597" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642321", "reference_id": "1642321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642321" }, { "reference_url": "https://security.gentoo.org/glsa/201908-10", "reference_id": "GLSA-201908-10", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:56Z/" } ], "url": "https://security.gentoo.org/glsa/201908-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3521", "reference_id": "RHSA-2018:3521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:56Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3521" }, { "reference_url": "https://usn.ubuntu.com/3804-1/", "reference_id": "USN-3804-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:56Z/" } ], "url": "https://usn.ubuntu.com/3804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933556?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.1%2B13-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.1%252B13-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933555?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1gha-995s-7qdg" }, { "vulnerability": "VCID-57sd-8y93-qqhu" }, { "vulnerability": "VCID-6r1k-8y1c-q7fm" }, { "vulnerability": "VCID-jxgd-j4wr-tyb7" }, { "vulnerability": "VCID-sz6r-65q1-q3bh" }, { "vulnerability": "VCID-xte1-h9nn-4bbk" }, { "vulnerability": "VCID-zsun-4q6p-8fek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933557?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~6ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062445?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067591?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077465?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31%2B11-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31%252B11-1%3Fdistro=sid" } ], "aliases": [ "CVE-2018-3150" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4c6b-h8rq-3fa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50790?format=api", "vulnerability_id": "VCID-g5ga-yx2a-gfhy", "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n software suites.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3149.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3149.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3149", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0053", "scoring_system": "epss", "scoring_elements": "0.6716", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0053", "scoring_system": "epss", "scoring_elements": "0.67198", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0053", "scoring_system": "epss", "scoring_elements": "0.67222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0053", "scoring_system": "epss", "scoring_elements": "0.67249", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0053", "scoring_system": "epss", "scoring_elements": "0.67263", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0053", "scoring_system": "epss", "scoring_elements": "0.67282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0053", "scoring_system": "epss", "scoring_elements": "0.67268", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68112", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68075", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68158", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68149", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68107", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00554", "scoring_system": "epss", "scoring_elements": "0.68124", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/105608", "reference_id": "105608", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "http://www.securityfocus.com/bid/105608" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639834", "reference_id": "1639834", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639834" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4326", "reference_id": "dsa-4326", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://www.debian.org/security/2018/dsa-4326" }, { "reference_url": "https://security.gentoo.org/glsa/201908-10", "reference_id": "GLSA-201908-10", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://security.gentoo.org/glsa/201908-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2942", "reference_id": "RHSA-2018:2942", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2943", "reference_id": "RHSA-2018:2943", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3000", "reference_id": "RHSA-2018:3000", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3001", "reference_id": "RHSA-2018:3001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3002", "reference_id": "RHSA-2018:3002", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3003", "reference_id": "RHSA-2018:3003", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3007", "reference_id": "RHSA-2018:3007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3008", "reference_id": "RHSA-2018:3008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3350", "reference_id": "RHSA-2018:3350", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3409", "reference_id": "RHSA-2018:3409", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3521", "reference_id": "RHSA-2018:3521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3533", "reference_id": "RHSA-2018:3533", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3534", "reference_id": "RHSA-2018:3534", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3671", "reference_id": "RHSA-2018:3671", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3672", "reference_id": "RHSA-2018:3672", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3779", "reference_id": "RHSA-2018:3779", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3852", "reference_id": "RHSA-2018:3852", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3852" }, { "reference_url": "https://usn.ubuntu.com/3804-1/", "reference_id": "USN-3804-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://usn.ubuntu.com/3804-1/" }, { "reference_url": "https://usn.ubuntu.com/3824-1/", "reference_id": "USN-3824-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:15Z/" } ], "url": "https://usn.ubuntu.com/3824-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933556?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.1%2B13-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.1%252B13-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933555?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1gha-995s-7qdg" }, { "vulnerability": "VCID-57sd-8y93-qqhu" }, { "vulnerability": "VCID-6r1k-8y1c-q7fm" }, { "vulnerability": "VCID-jxgd-j4wr-tyb7" }, { "vulnerability": "VCID-sz6r-65q1-q3bh" }, { "vulnerability": "VCID-xte1-h9nn-4bbk" }, { "vulnerability": "VCID-zsun-4q6p-8fek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933557?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~6ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062445?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067591?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077465?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31%2B11-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31%252B11-1%3Fdistro=sid" } ], "aliases": [ "CVE-2018-3149" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g5ga-yx2a-gfhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50788?format=api", "vulnerability_id": "VCID-kcch-9dfa-3qha", "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n software suites.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3136.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3136.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60041", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59897", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59974", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.6", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.5997", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.6002", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60033", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60054", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60038", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60061", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60053", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60024", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/105601", "reference_id": "105601", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "http://www.securityfocus.com/bid/105601" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639755", "reference_id": "1639755", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639755" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4326", "reference_id": "dsa-4326", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://www.debian.org/security/2018/dsa-4326" }, { "reference_url": "https://security.gentoo.org/glsa/201908-10", "reference_id": "GLSA-201908-10", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://security.gentoo.org/glsa/201908-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2942", "reference_id": "RHSA-2018:2942", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2943", "reference_id": "RHSA-2018:2943", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3000", "reference_id": "RHSA-2018:3000", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3001", "reference_id": "RHSA-2018:3001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3002", "reference_id": "RHSA-2018:3002", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3003", "reference_id": "RHSA-2018:3003", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3007", "reference_id": "RHSA-2018:3007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3008", "reference_id": "RHSA-2018:3008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3350", "reference_id": "RHSA-2018:3350", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3409", "reference_id": "RHSA-2018:3409", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3521", "reference_id": "RHSA-2018:3521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3533", "reference_id": "RHSA-2018:3533", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3534", "reference_id": "RHSA-2018:3534", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3671", "reference_id": "RHSA-2018:3671", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3672", "reference_id": "RHSA-2018:3672", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3779", "reference_id": "RHSA-2018:3779", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3852", "reference_id": "RHSA-2018:3852", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3852" }, { "reference_url": "https://usn.ubuntu.com/3804-1/", "reference_id": "USN-3804-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://usn.ubuntu.com/3804-1/" }, { "reference_url": "https://usn.ubuntu.com/3824-1/", "reference_id": "USN-3824-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:16Z/" } ], "url": "https://usn.ubuntu.com/3824-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933556?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.1%2B13-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.1%252B13-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933555?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1gha-995s-7qdg" }, { "vulnerability": "VCID-57sd-8y93-qqhu" }, { "vulnerability": "VCID-6r1k-8y1c-q7fm" }, { "vulnerability": "VCID-jxgd-j4wr-tyb7" }, { "vulnerability": "VCID-sz6r-65q1-q3bh" }, { "vulnerability": "VCID-xte1-h9nn-4bbk" }, { "vulnerability": "VCID-zsun-4q6p-8fek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933557?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~6ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062445?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067591?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077465?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31%2B11-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31%252B11-1%3Fdistro=sid" } ], "aliases": [ "CVE-2018-3136" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kcch-9dfa-3qha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50792?format=api", "vulnerability_id": "VCID-nfax-erng-ybfa", "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n software suites.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3157.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3157.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3157", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73288", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73298", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73429", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73346", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73339", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.7339", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73384", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73417", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73322", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73329", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73343", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0076", "scoring_system": "epss", "scoring_elements": "0.73367", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3157" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/105595", "reference_id": "105595", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:49Z/" } ], "url": "http://www.securityfocus.com/bid/105595" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642328", "reference_id": "1642328", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642328" }, { "reference_url": "https://security.gentoo.org/glsa/201908-10", "reference_id": "GLSA-201908-10", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:49Z/" } ], "url": "https://security.gentoo.org/glsa/201908-10" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933556?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.1%2B13-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.1%252B13-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933555?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1gha-995s-7qdg" }, { "vulnerability": "VCID-57sd-8y93-qqhu" }, { "vulnerability": "VCID-6r1k-8y1c-q7fm" }, { "vulnerability": "VCID-jxgd-j4wr-tyb7" }, { "vulnerability": "VCID-sz6r-65q1-q3bh" }, { "vulnerability": "VCID-xte1-h9nn-4bbk" }, { "vulnerability": "VCID-zsun-4q6p-8fek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933557?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~6ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062445?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067591?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077465?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31%2B11-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31%252B11-1%3Fdistro=sid" } ], "aliases": [ "CVE-2018-3157" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfax-erng-ybfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50794?format=api", "vulnerability_id": "VCID-sg33-wfn9-9ff5", "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n software suites.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3180.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25559", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25486", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25677", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25718", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25576", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25617", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31267", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3159", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31624", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3157", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31393", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/105617", "reference_id": "105617", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "http://www.securityfocus.com/bid/105617" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639484", "reference_id": "1639484", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639484" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4326", "reference_id": "dsa-4326", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://www.debian.org/security/2018/dsa-4326" }, { "reference_url": "https://security.gentoo.org/glsa/201908-10", "reference_id": "GLSA-201908-10", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://security.gentoo.org/glsa/201908-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2942", "reference_id": "RHSA-2018:2942", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2943", "reference_id": "RHSA-2018:2943", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3000", "reference_id": "RHSA-2018:3000", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3001", "reference_id": "RHSA-2018:3001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3002", "reference_id": "RHSA-2018:3002", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3003", "reference_id": "RHSA-2018:3003", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3007", "reference_id": "RHSA-2018:3007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3008", "reference_id": "RHSA-2018:3008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3350", "reference_id": "RHSA-2018:3350", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3409", "reference_id": "RHSA-2018:3409", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3521", "reference_id": "RHSA-2018:3521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3533", "reference_id": "RHSA-2018:3533", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3534", "reference_id": "RHSA-2018:3534", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3671", "reference_id": "RHSA-2018:3671", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3672", "reference_id": "RHSA-2018:3672", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3779", "reference_id": "RHSA-2018:3779", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3852", "reference_id": "RHSA-2018:3852", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3852" }, { "reference_url": "https://usn.ubuntu.com/3804-1/", "reference_id": "USN-3804-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://usn.ubuntu.com/3804-1/" }, { "reference_url": "https://usn.ubuntu.com/3824-1/", "reference_id": "USN-3824-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:28Z/" } ], "url": "https://usn.ubuntu.com/3824-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933556?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.1%2B13-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.1%252B13-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933555?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1gha-995s-7qdg" }, { "vulnerability": "VCID-57sd-8y93-qqhu" }, { "vulnerability": "VCID-6r1k-8y1c-q7fm" }, { "vulnerability": "VCID-jxgd-j4wr-tyb7" }, { "vulnerability": "VCID-sz6r-65q1-q3bh" }, { "vulnerability": "VCID-xte1-h9nn-4bbk" }, { "vulnerability": "VCID-zsun-4q6p-8fek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933557?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~6ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062445?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067591?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077465?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31%2B11-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31%252B11-1%3Fdistro=sid" } ], "aliases": [ "CVE-2018-3180" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sg33-wfn9-9ff5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50793?format=api", "vulnerability_id": "VCID-tqxt-f7k1-8yhn", "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n software suites.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3169.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3169.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3169", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66548", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66599", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66584", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66514", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66486", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66567", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66559", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66555", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/105587", "reference_id": "105587", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "http://www.securityfocus.com/bid/105587" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639293", "reference_id": "1639293", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639293" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4326", "reference_id": "dsa-4326", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://www.debian.org/security/2018/dsa-4326" }, { "reference_url": "https://security.gentoo.org/glsa/201908-10", "reference_id": "GLSA-201908-10", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://security.gentoo.org/glsa/201908-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2942", "reference_id": "RHSA-2018:2942", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2943", "reference_id": "RHSA-2018:2943", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3000", "reference_id": "RHSA-2018:3000", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3001", "reference_id": "RHSA-2018:3001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3002", "reference_id": "RHSA-2018:3002", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3003", "reference_id": "RHSA-2018:3003", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3350", "reference_id": "RHSA-2018:3350", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3409", "reference_id": "RHSA-2018:3409", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3521", "reference_id": "RHSA-2018:3521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3533", "reference_id": "RHSA-2018:3533", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3534", "reference_id": "RHSA-2018:3534", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3671", "reference_id": "RHSA-2018:3671", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3672", "reference_id": "RHSA-2018:3672", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3779", "reference_id": "RHSA-2018:3779", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3852", "reference_id": "RHSA-2018:3852", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3852" }, { "reference_url": "https://usn.ubuntu.com/3804-1/", "reference_id": "USN-3804-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://usn.ubuntu.com/3804-1/" }, { "reference_url": "https://usn.ubuntu.com/3824-1/", "reference_id": "USN-3824-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:12Z/" } ], "url": "https://usn.ubuntu.com/3824-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933556?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.1%2B13-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.1%252B13-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933555?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1gha-995s-7qdg" }, { "vulnerability": "VCID-57sd-8y93-qqhu" }, { "vulnerability": "VCID-6r1k-8y1c-q7fm" }, { "vulnerability": "VCID-jxgd-j4wr-tyb7" }, { "vulnerability": "VCID-sz6r-65q1-q3bh" }, { "vulnerability": "VCID-xte1-h9nn-4bbk" }, { "vulnerability": "VCID-zsun-4q6p-8fek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933557?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~6ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062445?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067591?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077465?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31%2B11-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31%252B11-1%3Fdistro=sid" } ], "aliases": [ "CVE-2018-3169" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tqxt-f7k1-8yhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50789?format=api", "vulnerability_id": "VCID-ugvk-tfnx-v7gz", "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n software suites.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3139.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3139.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3139", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26151", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26106", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26252", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26211", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2613", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26023", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40491", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4071", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40681", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40606", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40504", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" }, { "reference_url": "http://www.securityfocus.com/bid/105602", "reference_id": "105602", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "http://www.securityfocus.com/bid/105602" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639442", "reference_id": "1639442", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639442" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03952en_us", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4326", "reference_id": "dsa-4326", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://www.debian.org/security/2018/dsa-4326" }, { "reference_url": "https://security.gentoo.org/glsa/201908-10", "reference_id": "GLSA-201908-10", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://security.gentoo.org/glsa/201908-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2942", "reference_id": "RHSA-2018:2942", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2942" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2943", "reference_id": "RHSA-2018:2943", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:2943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3000", "reference_id": "RHSA-2018:3000", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3001", "reference_id": "RHSA-2018:3001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3002", "reference_id": "RHSA-2018:3002", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3003", "reference_id": "RHSA-2018:3003", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3007", "reference_id": "RHSA-2018:3007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3008", "reference_id": "RHSA-2018:3008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3350", "reference_id": "RHSA-2018:3350", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3409", "reference_id": "RHSA-2018:3409", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3409" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3521", "reference_id": "RHSA-2018:3521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3533", "reference_id": "RHSA-2018:3533", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3534", "reference_id": "RHSA-2018:3534", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3671", "reference_id": "RHSA-2018:3671", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3672", "reference_id": "RHSA-2018:3672", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3779", "reference_id": "RHSA-2018:3779", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3852", "reference_id": "RHSA-2018:3852", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:3852" }, { "reference_url": "https://usn.ubuntu.com/3804-1/", "reference_id": "USN-3804-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://usn.ubuntu.com/3804-1/" }, { "reference_url": "https://usn.ubuntu.com/3824-1/", "reference_id": "USN-3824-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:13Z/" } ], "url": "https://usn.ubuntu.com/3824-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933556?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.1%2B13-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.1%252B13-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933555?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1gha-995s-7qdg" }, { "vulnerability": "VCID-57sd-8y93-qqhu" }, { "vulnerability": "VCID-6r1k-8y1c-q7fm" }, { "vulnerability": "VCID-jxgd-j4wr-tyb7" }, { "vulnerability": "VCID-sz6r-65q1-q3bh" }, { "vulnerability": "VCID-xte1-h9nn-4bbk" }, { "vulnerability": "VCID-zsun-4q6p-8fek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933557?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~6ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062445?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067591?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31~10ea-2?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-2%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077465?format=api", "purl": "pkg:deb/debian/openjdk-11@11.0.31%2B11-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31%252B11-1%3Fdistro=sid" } ], "aliases": [ "CVE-2018-3139" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ugvk-tfnx-v7gz" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.1%252B13-1%3Fdistro=sid" }