Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjfx@0?distro=trixie
Typedeb
Namespacedebian
Nameopenjfx
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8u91-b14-1
Latest_non_vulnerable_version11.0.11+1-7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-29d8-nuyz-yua9
vulnerability_id VCID-29d8-nuyz-yua9
summary
Vulnerability affecting the org.openjfx:javafx-media maven component of the OpenJFX project
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX).  Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and  21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20925
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44362
published_at 2026-04-09T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44393
published_at 2026-04-18T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44402
published_at 2026-04-16T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44346
published_at 2026-04-13T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44348
published_at 2026-04-12T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44379
published_at 2026-04-11T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44347
published_at 2026-04-02T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44368
published_at 2026-04-04T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44305
published_at 2026-04-07T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44357
published_at 2026-04-08T12:55:00Z
10
value 0.00238
scoring_system epss
scoring_elements 0.46926
published_at 2026-04-26T12:55:00Z
11
value 0.00238
scoring_system epss
scoring_elements 0.46915
published_at 2026-04-24T12:55:00Z
12
value 0.00238
scoring_system epss
scoring_elements 0.4693
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20925
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://github.com/openjdk/jfx
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openjdk/jfx
3
reference_url https://github.com/openjdk/jfx17u/commit/18206453163dec04f36f8787ce73624bb9ba6a7d
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openjdk/jfx17u/commit/18206453163dec04f36f8787ce73624bb9ba6a7d
4
reference_url https://github.com/openjdk/jfx21u/commit/0c00753da13ed696b1a5025ce01ff478ee7ebd0a
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openjdk/jfx21u/commit/0c00753da13ed696b1a5025ce01ff478ee7ebd0a
5
reference_url https://github.com/openjdk/jfx/blob/4beeb89f864ccf1424db36c9739a7f6999adeecc/doc-files/release-notes-22.md?plain=1#L122
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openjdk/jfx/blob/4beeb89f864ccf1424db36c9739a7f6999adeecc/doc-files/release-notes-22.md?plain=1#L122
6
reference_url https://github.com/openjdk/jfx/commit/0a52a4cf1d1226e7a3c6d73313fde02e7f36fb11
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openjdk/jfx/commit/0a52a4cf1d1226e7a3c6d73313fde02e7f36fb11
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-20925
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-20925
8
reference_url https://openjdk.org/groups/vulnerability/advisories/2024-01-16
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://openjdk.org/groups/vulnerability/advisories/2024-01-16
9
reference_url https://security.netapp.com/advisory/ntap-20240201-0002
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240201-0002
10
reference_url https://www.oracle.com/security-alerts/cpujan2024.html
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T19:35:19Z/
url https://www.oracle.com/security-alerts/cpujan2024.html
11
reference_url https://github.com/advisories/GHSA-47g3-mf24-6559
reference_id GHSA-47g3-mf24-6559
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-47g3-mf24-6559
fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
aliases CVE-2024-20925, GHSA-47g3-mf24-6559
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29d8-nuyz-yua9
1
url VCID-486u-xhmt-cbdt
vulnerability_id VCID-486u-xhmt-cbdt
summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u401; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21005
reference_id
reference_type
scores
0
value 0.00157
scoring_system epss
scoring_elements 0.36153
published_at 2026-04-26T12:55:00Z
1
value 0.00157
scoring_system epss
scoring_elements 0.36466
published_at 2026-04-18T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36443
published_at 2026-04-13T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36483
published_at 2026-04-16T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36409
published_at 2026-04-21T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.36183
published_at 2026-04-24T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.3655
published_at 2026-04-02T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36583
published_at 2026-04-04T12:55:00Z
8
value 0.00157
scoring_system epss
scoring_elements 0.36422
published_at 2026-04-07T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36473
published_at 2026-04-08T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.36494
published_at 2026-04-09T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36501
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21005
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
5
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:06:59Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:06:59Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
aliases CVE-2024-21005
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-486u-xhmt-cbdt
2
url VCID-8b85-sby2-ebhb
vulnerability_id VCID-8b85-sby2-ebhb
summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u401; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 2.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21002
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.16222
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16283
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.1603
published_at 2026-04-26T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16153
published_at 2026-04-13T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16088
published_at 2026-04-16T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16103
published_at 2026-04-18T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16142
published_at 2026-04-21T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16032
published_at 2026-04-24T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16128
published_at 2026-04-07T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16213
published_at 2026-04-08T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16279
published_at 2026-04-09T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16261
published_at 2026-04-11T12:55:00Z
12
value 0.00052
scoring_system epss
scoring_elements 0.16221
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21002
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
5
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T15:53:46Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T15:53:46Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
aliases CVE-2024-21002
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8b85-sby2-ebhb
3
url VCID-fqn2-qdd1-3fhg
vulnerability_id VCID-fqn2-qdd1-3fhg
summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and 21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20923
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.5763
published_at 2026-04-26T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57674
published_at 2026-04-18T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57653
published_at 2026-04-21T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.5761
published_at 2026-04-24T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57619
published_at 2026-04-02T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.5764
published_at 2026-04-04T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57616
published_at 2026-04-07T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.5767
published_at 2026-04-08T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57675
published_at 2026-04-09T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57689
published_at 2026-04-11T12:55:00Z
10
value 0.00352
scoring_system epss
scoring_elements 0.57668
published_at 2026-04-12T12:55:00Z
11
value 0.00352
scoring_system epss
scoring_elements 0.57648
published_at 2026-04-13T12:55:00Z
12
value 0.00352
scoring_system epss
scoring_elements 0.57678
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20923
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
aliases CVE-2024-20923
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fqn2-qdd1-3fhg
4
url VCID-h2gf-sn1q-6bac
vulnerability_id VCID-h2gf-sn1q-6bac
summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u401; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 2.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21004
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13222
published_at 2026-04-26T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13253
published_at 2026-04-13T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13159
published_at 2026-04-16T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13158
published_at 2026-04-18T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13245
published_at 2026-04-21T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.1325
published_at 2026-04-24T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13326
published_at 2026-04-02T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.1339
published_at 2026-04-04T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13238
published_at 2026-04-07T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.1332
published_at 2026-04-08T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13372
published_at 2026-04-09T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.1334
published_at 2026-04-11T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.13303
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21004
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
5
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:11:37Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:11:37Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
aliases CVE-2024-21004
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2gf-sn1q-6bac
5
url VCID-mw4a-31ag-6udf
vulnerability_id VCID-mw4a-31ag-6udf
summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u401; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21003
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42545
published_at 2026-04-26T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42655
published_at 2026-04-12T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42638
published_at 2026-04-13T12:55:00Z
3
value 0.00205
scoring_system epss
scoring_elements 0.42698
published_at 2026-04-16T12:55:00Z
4
value 0.00205
scoring_system epss
scoring_elements 0.42684
published_at 2026-04-18T12:55:00Z
5
value 0.00205
scoring_system epss
scoring_elements 0.42621
published_at 2026-04-21T12:55:00Z
6
value 0.00205
scoring_system epss
scoring_elements 0.42637
published_at 2026-04-02T12:55:00Z
7
value 0.00205
scoring_system epss
scoring_elements 0.42665
published_at 2026-04-04T12:55:00Z
8
value 0.00205
scoring_system epss
scoring_elements 0.42605
published_at 2026-04-07T12:55:00Z
9
value 0.00205
scoring_system epss
scoring_elements 0.42657
published_at 2026-04-08T12:55:00Z
10
value 0.00205
scoring_system epss
scoring_elements 0.42668
published_at 2026-04-09T12:55:00Z
11
value 0.00205
scoring_system epss
scoring_elements 0.42692
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21003
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
5
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:05:54Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:05:54Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
aliases CVE-2024-21003
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mw4a-31ag-6udf
6
url VCID-vb15-km37-3ud9
vulnerability_id VCID-vb15-km37-3ud9
summary Vulnerability in Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u471-b50. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21947
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11084
published_at 2026-04-26T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11224
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11062
published_at 2026-04-18T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11194
published_at 2026-04-21T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11129
published_at 2026-04-24T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11287
published_at 2026-04-04T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11102
published_at 2026-04-07T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11182
published_at 2026-04-08T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11239
published_at 2026-04-09T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11248
published_at 2026-04-11T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.11216
published_at 2026-04-12T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.1119
published_at 2026-04-13T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.11054
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21947
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:08:23Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
aliases CVE-2026-21947
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vb15-km37-3ud9
7
url VCID-wcrz-y3gd-bueb
vulnerability_id VCID-wcrz-y3gd-bueb
summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and 21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 2.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20922
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17351
published_at 2026-04-26T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17417
published_at 2026-04-16T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17427
published_at 2026-04-18T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17462
published_at 2026-04-21T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17374
published_at 2026-04-24T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17644
published_at 2026-04-02T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.1769
published_at 2026-04-04T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17409
published_at 2026-04-07T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17501
published_at 2026-04-08T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17562
published_at 2026-04-09T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17575
published_at 2026-04-11T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17528
published_at 2026-04-12T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17475
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20922
1
reference_url https://security.netapp.com/advisory/ntap-20240201-0002/
reference_id ntap-20240201-0002
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:33Z/
url https://security.netapp.com/advisory/ntap-20240201-0002/
fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
aliases CVE-2024-20922
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcrz-y3gd-bueb
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie