Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/99054?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/99054?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.10-1?arch=el8_6", "type": "rpm", "namespace": "redhat", "name": "java-1.8.0-ibm", "version": "1:1.8.0.7.10-1", "qualifiers": { "arch": "el8_6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79485?format=api", "vulnerability_id": "VCID-1d6t-ndfc-m7hg", "summary": "OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21443", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17914", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18274", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18326", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18029", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18111", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18174", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18126", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18078", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1802", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18067", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17976", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17952", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075793", "reference_id": "2075793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075793" }, { "reference_url": "https://security.archlinux.org/AVG-2686", "reference_id": "AVG-2686", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2686" }, { "reference_url": "https://security.archlinux.org/AVG-2687", "reference_id": "AVG-2687", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2687" }, { "reference_url": "https://security.archlinux.org/AVG-2688", "reference_id": "AVG-2688", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2688" }, { "reference_url": "https://security.archlinux.org/AVG-2689", "reference_id": "AVG-2689", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2689" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5128", "reference_id": "dsa-5128", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5128" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5131", "reference_id": "dsa-5131", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5131" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0006/", "reference_id": "ntap-20220429-0006", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1435", "reference_id": "RHSA-2022:1435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1436", "reference_id": "RHSA-2022:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1437", "reference_id": "RHSA-2022:1437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1438", "reference_id": "RHSA-2022:1438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1439", "reference_id": "RHSA-2022:1439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1440", "reference_id": "RHSA-2022:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1441", "reference_id": "RHSA-2022:1441", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1441" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1442", "reference_id": "RHSA-2022:1442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1443", "reference_id": "RHSA-2022:1443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1444", "reference_id": "RHSA-2022:1444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1445", "reference_id": "RHSA-2022:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1487", "reference_id": "RHSA-2022:1487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1488", "reference_id": "RHSA-2022:1488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1488" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1489", "reference_id": "RHSA-2022:1489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1490", "reference_id": "RHSA-2022:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1491", "reference_id": "RHSA-2022:1491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1492", "reference_id": "RHSA-2022:1492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1728", "reference_id": "RHSA-2022:1728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1729", "reference_id": "RHSA-2022:1729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2137", "reference_id": "RHSA-2022:2137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4957", "reference_id": "RHSA-2022:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4959", "reference_id": "RHSA-2022:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5837", "reference_id": "RHSA-2022:5837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5837" }, { "reference_url": "https://usn.ubuntu.com/5388-1/", "reference_id": "USN-5388-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5388-1/" }, { "reference_url": "https://usn.ubuntu.com/5388-2/", "reference_id": "USN-5388-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5388-2/" }, { "reference_url": "https://usn.ubuntu.com/5546-1/", "reference_id": "USN-5546-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5546-1/" }, { "reference_url": "https://usn.ubuntu.com/5546-2/", "reference_id": "USN-5546-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5546-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21443" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1d6t-ndfc-m7hg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79469?format=api", "vulnerability_id": "VCID-cqby-hxsb-skgm", "summary": "java-11-openj9,java-1_8_0-openj9: unverified methods can be invoked using MethodHandles", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41041.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41041.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-41041", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21872", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22035", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22087", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23433", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23504", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23553", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23528", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23474", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23488", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2348", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23459", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23274", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23263", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23253", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-41041" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080954", "reference_id": "2080954", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4959", "reference_id": "RHSA-2022:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5837", "reference_id": "RHSA-2022:5837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5837" } ], "fixed_packages": [], "aliases": [ "CVE-2021-41041" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cqby-hxsb-skgm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34342?format=api", "vulnerability_id": "VCID-he8f-erpk-sqh8", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38981", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38756", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38839", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38862", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39189", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39168", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39071", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3916", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3919", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39192", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3918", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39163", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39109", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014524", "reference_id": "2014524", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014524" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/", "reference_id": "7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/", "reference_id": "DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4957", "reference_id": "RHSA-2022:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4959", "reference_id": "RHSA-2022:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5837", "reference_id": "RHSA-2022:5837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5837" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/", "reference_id": "V362B2BWTH5IJDL45QPQGMBKIQOG7JX5", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35561" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-he8f-erpk-sqh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79489?format=api", "vulnerability_id": "VCID-y5qu-j3wt-wuej", "summary": "OpenJDK: URI parsing inconsistencies (JNDI, 8278972)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21496", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2901", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28828", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28899", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29352", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29164", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29269", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29229", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29176", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29203", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29178", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29132", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21496" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075849", "reference_id": "2075849", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075849" }, { "reference_url": "https://security.archlinux.org/AVG-2686", "reference_id": "AVG-2686", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2686" }, { "reference_url": "https://security.archlinux.org/AVG-2687", "reference_id": "AVG-2687", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2687" }, { "reference_url": "https://security.archlinux.org/AVG-2688", "reference_id": "AVG-2688", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2688" }, { "reference_url": "https://security.archlinux.org/AVG-2689", "reference_id": "AVG-2689", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2689" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5128", "reference_id": "dsa-5128", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5128" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5131", "reference_id": "dsa-5131", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5131" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0006/", "reference_id": "ntap-20220429-0006", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1435", "reference_id": "RHSA-2022:1435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1436", "reference_id": "RHSA-2022:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1437", "reference_id": "RHSA-2022:1437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1438", "reference_id": "RHSA-2022:1438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1439", "reference_id": "RHSA-2022:1439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1440", "reference_id": "RHSA-2022:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1441", "reference_id": "RHSA-2022:1441", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1441" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1442", "reference_id": "RHSA-2022:1442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1443", "reference_id": "RHSA-2022:1443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1444", "reference_id": "RHSA-2022:1444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1445", "reference_id": "RHSA-2022:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1487", "reference_id": "RHSA-2022:1487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1488", "reference_id": "RHSA-2022:1488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1488" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1489", "reference_id": "RHSA-2022:1489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1490", "reference_id": "RHSA-2022:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1491", "reference_id": "RHSA-2022:1491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1492", "reference_id": "RHSA-2022:1492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1728", "reference_id": "RHSA-2022:1728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1729", "reference_id": "RHSA-2022:1729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2137", "reference_id": "RHSA-2022:2137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4957", "reference_id": "RHSA-2022:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4959", "reference_id": "RHSA-2022:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5837", "reference_id": "RHSA-2022:5837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5837" }, { "reference_url": "https://usn.ubuntu.com/5388-1/", "reference_id": "USN-5388-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5388-1/" }, { "reference_url": "https://usn.ubuntu.com/5388-2/", "reference_id": "USN-5388-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5388-2/" }, { "reference_url": "https://usn.ubuntu.com/5546-1/", "reference_id": "USN-5546-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5546-1/" }, { "reference_url": "https://usn.ubuntu.com/5546-2/", "reference_id": "USN-5546-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5546-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21496" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5qu-j3wt-wuej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79487?format=api", "vulnerability_id": "VCID-zh9v-47ue-p7ep", "summary": "OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21434", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28643", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28713", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28823", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28972", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.2911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28992", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29014", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.2899", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.2904", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29084", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29078", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29036", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075836", "reference_id": "2075836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075836" }, { "reference_url": "https://security.archlinux.org/AVG-2686", "reference_id": "AVG-2686", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2686" }, { "reference_url": "https://security.archlinux.org/AVG-2687", "reference_id": "AVG-2687", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2687" }, { "reference_url": "https://security.archlinux.org/AVG-2688", "reference_id": "AVG-2688", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2688" }, { "reference_url": "https://security.archlinux.org/AVG-2689", "reference_id": "AVG-2689", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2689" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5128", "reference_id": "dsa-5128", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5128" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5131", "reference_id": "dsa-5131", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5131" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0006/", "reference_id": "ntap-20220429-0006", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1435", "reference_id": "RHSA-2022:1435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1436", "reference_id": "RHSA-2022:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1437", "reference_id": "RHSA-2022:1437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1438", "reference_id": "RHSA-2022:1438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1439", "reference_id": "RHSA-2022:1439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1440", "reference_id": "RHSA-2022:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1441", "reference_id": "RHSA-2022:1441", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1441" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1442", "reference_id": "RHSA-2022:1442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1443", "reference_id": "RHSA-2022:1443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1444", "reference_id": "RHSA-2022:1444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1445", "reference_id": "RHSA-2022:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1487", "reference_id": "RHSA-2022:1487", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1487" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1488", "reference_id": "RHSA-2022:1488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1488" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1489", "reference_id": "RHSA-2022:1489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1490", "reference_id": "RHSA-2022:1490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1490" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1491", "reference_id": "RHSA-2022:1491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1492", "reference_id": "RHSA-2022:1492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1728", "reference_id": "RHSA-2022:1728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1729", "reference_id": "RHSA-2022:1729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2137", "reference_id": "RHSA-2022:2137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4957", "reference_id": "RHSA-2022:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4959", "reference_id": "RHSA-2022:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5837", "reference_id": "RHSA-2022:5837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5837" }, { "reference_url": "https://usn.ubuntu.com/5388-1/", "reference_id": "USN-5388-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5388-1/" }, { "reference_url": "https://usn.ubuntu.com/5388-2/", "reference_id": "USN-5388-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5388-2/" }, { "reference_url": "https://usn.ubuntu.com/5546-1/", "reference_id": "USN-5546-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5546-1/" }, { "reference_url": "https://usn.ubuntu.com/5546-2/", "reference_id": "USN-5546-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5546-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21434" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zh9v-47ue-p7ep" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.10-1%3Farch=el8_6" }