Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.10-1jpp.1?arch=el7
Typerpm
Namespaceredhat
Namejava-1.8.0-ibm
Version1:1.8.0.7.10-1jpp.1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1d6t-ndfc-m7hg
vulnerability_id VCID-1d6t-ndfc-m7hg
summary OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21443
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.17914
published_at 2026-04-29T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18326
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18029
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18111
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18168
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18174
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18126
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18078
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.1802
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18033
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18067
published_at 2026-04-21T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.17976
published_at 2026-04-24T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.17952
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075793
reference_id 2075793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075793
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
aliases CVE-2022-21443
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d6t-ndfc-m7hg
1
url VCID-cqby-hxsb-skgm
vulnerability_id VCID-cqby-hxsb-skgm
summary java-11-openj9,java-1_8_0-openj9: unverified methods can be invoked using MethodHandles
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41041.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41041.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-41041
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21872
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22035
published_at 2026-04-02T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22087
published_at 2026-04-04T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23433
published_at 2026-04-07T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23504
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23553
published_at 2026-04-09T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23571
published_at 2026-04-11T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23528
published_at 2026-04-12T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23474
published_at 2026-04-13T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23488
published_at 2026-04-16T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.2348
published_at 2026-04-18T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23459
published_at 2026-04-21T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23274
published_at 2026-04-24T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.23263
published_at 2026-04-26T12:55:00Z
14
value 0.00079
scoring_system epss
scoring_elements 0.23253
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-41041
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2080954
reference_id 2080954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2080954
3
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
4
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
fixed_packages
aliases CVE-2021-41041
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cqby-hxsb-skgm
2
url VCID-he8f-erpk-sqh8
vulnerability_id VCID-he8f-erpk-sqh8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38981
published_at 2026-04-01T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.38756
published_at 2026-04-29T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.38839
published_at 2026-04-26T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.38862
published_at 2026-04-24T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39189
published_at 2026-04-04T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-02T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39071
published_at 2026-04-21T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.3916
published_at 2026-04-18T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.3919
published_at 2026-04-16T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39136
published_at 2026-04-13T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39155
published_at 2026-04-12T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.39192
published_at 2026-04-11T12:55:00Z
12
value 0.00176
scoring_system epss
scoring_elements 0.3918
published_at 2026-04-09T12:55:00Z
13
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-08T12:55:00Z
14
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
reference_id 2014524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014524
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
17
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
18
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
20
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5000
21
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://www.debian.org/security/2021/dsa-5012
22
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://security.gentoo.org/glsa/202209-05
23
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
27
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
28
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
29
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
30
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
31
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
32
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
33
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
34
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
35
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
36
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
37
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
38
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
39
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
40
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
41
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
42
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
43
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
44
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
45
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
46
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
aliases CVE-2021-35561
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-he8f-erpk-sqh8
3
url VCID-y5qu-j3wt-wuej
vulnerability_id VCID-y5qu-j3wt-wuej
summary OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21496
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.2901
published_at 2026-04-24T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29303
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.28828
published_at 2026-04-29T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.28899
published_at 2026-04-26T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29352
published_at 2026-04-04T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29164
published_at 2026-04-07T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29228
published_at 2026-04-08T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29269
published_at 2026-04-09T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29275
published_at 2026-04-11T12:55:00Z
9
value 0.00109
scoring_system epss
scoring_elements 0.29229
published_at 2026-04-12T12:55:00Z
10
value 0.00109
scoring_system epss
scoring_elements 0.29176
published_at 2026-04-13T12:55:00Z
11
value 0.00109
scoring_system epss
scoring_elements 0.29203
published_at 2026-04-16T12:55:00Z
12
value 0.00109
scoring_system epss
scoring_elements 0.29178
published_at 2026-04-18T12:55:00Z
13
value 0.00109
scoring_system epss
scoring_elements 0.29132
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075849
reference_id 2075849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075849
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
aliases CVE-2022-21496
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5qu-j3wt-wuej
4
url VCID-zh9v-47ue-p7ep
vulnerability_id VCID-zh9v-47ue-p7ep
summary OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21434
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28643
published_at 2026-04-29T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.28713
published_at 2026-04-26T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.28823
published_at 2026-04-24T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.28946
published_at 2026-04-21T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.28972
published_at 2026-04-07T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29161
published_at 2026-04-04T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.2911
published_at 2026-04-02T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.28992
published_at 2026-04-18T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29014
published_at 2026-04-16T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.2899
published_at 2026-04-13T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.2904
published_at 2026-04-12T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29084
published_at 2026-04-11T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.29078
published_at 2026-04-09T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.29036
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075836
reference_id 2075836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075836
10
reference_url https://security.archlinux.org/AVG-2686
reference_id AVG-2686
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2686
11
reference_url https://security.archlinux.org/AVG-2687
reference_id AVG-2687
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2687
12
reference_url https://security.archlinux.org/AVG-2688
reference_id AVG-2688
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2688
13
reference_url https://security.archlinux.org/AVG-2689
reference_id AVG-2689
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2689
14
reference_url https://www.debian.org/security/2022/dsa-5128
reference_id dsa-5128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://www.debian.org/security/2022/dsa-5128
15
reference_url https://www.debian.org/security/2022/dsa-5131
reference_id dsa-5131
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://www.debian.org/security/2022/dsa-5131
16
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
17
reference_url https://security.netapp.com/advisory/ntap-20220429-0006/
reference_id ntap-20220429-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/
url https://security.netapp.com/advisory/ntap-20220429-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2022:1435
reference_id RHSA-2022:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1435
19
reference_url https://access.redhat.com/errata/RHSA-2022:1436
reference_id RHSA-2022:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1436
20
reference_url https://access.redhat.com/errata/RHSA-2022:1437
reference_id RHSA-2022:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1437
21
reference_url https://access.redhat.com/errata/RHSA-2022:1438
reference_id RHSA-2022:1438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1438
22
reference_url https://access.redhat.com/errata/RHSA-2022:1439
reference_id RHSA-2022:1439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1439
23
reference_url https://access.redhat.com/errata/RHSA-2022:1440
reference_id RHSA-2022:1440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1440
24
reference_url https://access.redhat.com/errata/RHSA-2022:1441
reference_id RHSA-2022:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1441
25
reference_url https://access.redhat.com/errata/RHSA-2022:1442
reference_id RHSA-2022:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1442
26
reference_url https://access.redhat.com/errata/RHSA-2022:1443
reference_id RHSA-2022:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1443
27
reference_url https://access.redhat.com/errata/RHSA-2022:1444
reference_id RHSA-2022:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1444
28
reference_url https://access.redhat.com/errata/RHSA-2022:1445
reference_id RHSA-2022:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1445
29
reference_url https://access.redhat.com/errata/RHSA-2022:1487
reference_id RHSA-2022:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1487
30
reference_url https://access.redhat.com/errata/RHSA-2022:1488
reference_id RHSA-2022:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1488
31
reference_url https://access.redhat.com/errata/RHSA-2022:1489
reference_id RHSA-2022:1489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1489
32
reference_url https://access.redhat.com/errata/RHSA-2022:1490
reference_id RHSA-2022:1490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1490
33
reference_url https://access.redhat.com/errata/RHSA-2022:1491
reference_id RHSA-2022:1491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1491
34
reference_url https://access.redhat.com/errata/RHSA-2022:1492
reference_id RHSA-2022:1492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1492
35
reference_url https://access.redhat.com/errata/RHSA-2022:1728
reference_id RHSA-2022:1728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1728
36
reference_url https://access.redhat.com/errata/RHSA-2022:1729
reference_id RHSA-2022:1729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1729
37
reference_url https://access.redhat.com/errata/RHSA-2022:2137
reference_id RHSA-2022:2137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2137
38
reference_url https://access.redhat.com/errata/RHSA-2022:4957
reference_id RHSA-2022:4957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4957
39
reference_url https://access.redhat.com/errata/RHSA-2022:4959
reference_id RHSA-2022:4959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4959
40
reference_url https://access.redhat.com/errata/RHSA-2022:5837
reference_id RHSA-2022:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5837
41
reference_url https://usn.ubuntu.com/5388-1/
reference_id USN-5388-1
reference_type
scores
url https://usn.ubuntu.com/5388-1/
42
reference_url https://usn.ubuntu.com/5388-2/
reference_id USN-5388-2
reference_type
scores
url https://usn.ubuntu.com/5388-2/
43
reference_url https://usn.ubuntu.com/5546-1/
reference_id USN-5546-1
reference_type
scores
url https://usn.ubuntu.com/5546-1/
44
reference_url https://usn.ubuntu.com/5546-2/
reference_id USN-5546-2
reference_type
scores
url https://usn.ubuntu.com/5546-2/
fixed_packages
aliases CVE-2022-21434
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zh9v-47ue-p7ep
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.10-1jpp.1%3Farch=el7