Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.5-1?arch=el8_5
Typerpm
Namespaceredhat
Namejava-1.8.0-ibm
Version1:1.8.0.7.5-1
Qualifiers
arch el8_5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3aae-859j-1bg9
vulnerability_id VCID-3aae-859j-1bg9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21293
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26644
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26688
published_at 2026-04-04T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26473
published_at 2026-04-07T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26541
published_at 2026-04-08T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.2659
published_at 2026-04-09T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26596
published_at 2026-04-11T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26551
published_at 2026-04-12T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26494
published_at 2026-04-13T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.265
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041417
reference_id 2041417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041417
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
aliases CVE-2022-21293
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aae-859j-1bg9
1
url VCID-3hj5-z3ck-tkha
vulnerability_id VCID-3hj5-z3ck-tkha
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21365
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-16T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21365
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041785
reference_id 2041785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041785
19
reference_url https://www.debian.org/security/2022/dsa-5057
reference_id dsa-5057
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://www.debian.org/security/2022/dsa-5057
20
reference_url https://www.debian.org/security/2022/dsa-5058
reference_id dsa-5058
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://www.debian.org/security/2022/dsa-5058
21
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://security.gentoo.org/glsa/202209-05
22
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
23
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
25
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
26
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
27
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
28
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
29
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
30
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
31
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
32
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
33
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
34
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
35
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
36
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
37
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
38
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
39
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
40
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
41
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
42
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
43
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
44
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
aliases CVE-2022-21365
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hj5-z3ck-tkha
2
url VCID-4thy-7844-xuc9
vulnerability_id VCID-4thy-7844-xuc9
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21360
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041491
reference_id 2041491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041491
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
aliases CVE-2022-21360
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4thy-7844-xuc9
3
url VCID-5xg6-kds9-g3hf
vulnerability_id VCID-5xg6-kds9-g3hf
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21294
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041427
reference_id 2041427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041427
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
aliases CVE-2022-21294
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xg6-kds9-g3hf
4
url VCID-98bc-5jrc-5kas
vulnerability_id VCID-98bc-5jrc-5kas
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21341
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-02T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-04T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-07T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29669
published_at 2026-04-08T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29706
published_at 2026-04-09T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-11T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29664
published_at 2026-04-12T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-13T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041897
reference_id 2041897
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041897
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
aliases CVE-2022-21341
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-98bc-5jrc-5kas
5
url VCID-p5ye-19wy-ayb8
vulnerability_id VCID-p5ye-19wy-ayb8
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31435
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31485
published_at 2026-04-08T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.3157
published_at 2026-04-02T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31474
published_at 2026-04-16T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.3144
published_at 2026-04-13T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-12T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31514
published_at 2026-04-09T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31613
published_at 2026-04-04T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31432
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
reference_id 2015311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015311
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://security.archlinux.org/AVG-2477
reference_id AVG-2477
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2477
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5000
19
reference_url https://www.debian.org/security/2021/dsa-5012
reference_id dsa-5012
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://www.debian.org/security/2021/dsa-5012
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2021:4135
reference_id RHSA-2021:4135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4135
38
reference_url https://access.redhat.com/errata/RHSA-2021:4531
reference_id RHSA-2021:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4531
39
reference_url https://access.redhat.com/errata/RHSA-2021:4532
reference_id RHSA-2021:4532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4532
40
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
41
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
42
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
43
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
fixed_packages
aliases CVE-2021-35603
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ye-19wy-ayb8
6
url VCID-rmqx-pseh-q7a7
vulnerability_id VCID-rmqx-pseh-q7a7
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35550
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23084
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23159
published_at 2026-04-16T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23142
published_at 2026-04-13T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23092
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23217
published_at 2026-04-09T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23166
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23303
published_at 2026-04-04T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-02T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23201
published_at 2026-04-12T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23238
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35550
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015648
reference_id 2015648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015648
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
reference_id 6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
reference_id 7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
16
reference_url https://security.archlinux.org/AVG-2478
reference_id AVG-2478
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2478
17
reference_url https://security.archlinux.org/AVG-2479
reference_id AVG-2479
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2479
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
reference_id DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
19
reference_url https://www.debian.org/security/2021/dsa-5000
reference_id dsa-5000
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://www.debian.org/security/2021/dsa-5000
20
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://security.gentoo.org/glsa/202209-05
21
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
reference_id GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
reference_id GXTUWAWXVU37GRNIG4TPMA47THO6VAE6
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
24
reference_url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
25
reference_url https://access.redhat.com/errata/RHSA-2021:3884
reference_id RHSA-2021:3884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3884
26
reference_url https://access.redhat.com/errata/RHSA-2021:3885
reference_id RHSA-2021:3885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3885
27
reference_url https://access.redhat.com/errata/RHSA-2021:3886
reference_id RHSA-2021:3886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3886
28
reference_url https://access.redhat.com/errata/RHSA-2021:3887
reference_id RHSA-2021:3887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3887
29
reference_url https://access.redhat.com/errata/RHSA-2021:3889
reference_id RHSA-2021:3889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3889
30
reference_url https://access.redhat.com/errata/RHSA-2021:3891
reference_id RHSA-2021:3891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3891
31
reference_url https://access.redhat.com/errata/RHSA-2021:3892
reference_id RHSA-2021:3892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3892
32
reference_url https://access.redhat.com/errata/RHSA-2021:3893
reference_id RHSA-2021:3893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3893
33
reference_url https://access.redhat.com/errata/RHSA-2021:3960
reference_id RHSA-2021:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3960
34
reference_url https://access.redhat.com/errata/RHSA-2021:3961
reference_id RHSA-2021:3961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3961
35
reference_url https://access.redhat.com/errata/RHSA-2021:3967
reference_id RHSA-2021:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3967
36
reference_url https://access.redhat.com/errata/RHSA-2021:3968
reference_id RHSA-2021:3968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3968
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5202-1/
reference_id USN-5202-1
reference_type
scores
url https://usn.ubuntu.com/5202-1/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
reference_id V362B2BWTH5IJDL45QPQGMBKIQOG7JX5
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
fixed_packages
aliases CVE-2021-35550
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmqx-pseh-q7a7
7
url VCID-tr4r-wm4s-auej
vulnerability_id VCID-tr4r-wm4s-auej
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21340
reference_id
reference_type
scores
0
value 0.06446
scoring_system epss
scoring_elements 0.91022
published_at 2026-04-02T12:55:00Z
1
value 0.06446
scoring_system epss
scoring_elements 0.91031
published_at 2026-04-04T12:55:00Z
2
value 0.06446
scoring_system epss
scoring_elements 0.9104
published_at 2026-04-07T12:55:00Z
3
value 0.06446
scoring_system epss
scoring_elements 0.91052
published_at 2026-04-08T12:55:00Z
4
value 0.06446
scoring_system epss
scoring_elements 0.91059
published_at 2026-04-09T12:55:00Z
5
value 0.06446
scoring_system epss
scoring_elements 0.91067
published_at 2026-04-13T12:55:00Z
6
value 0.06446
scoring_system epss
scoring_elements 0.91091
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041884
reference_id 2041884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041884
19
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
url https://security.gentoo.org/glsa/202209-05
20
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
21
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
22
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
23
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
24
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
25
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
26
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
27
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
28
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
29
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
30
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
31
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
32
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
33
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
34
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
35
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
36
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
37
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
38
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
39
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
40
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
aliases CVE-2022-21340
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tr4r-wm4s-auej
8
url VCID-xfqx-d3jw-yuhn
vulnerability_id VCID-xfqx-d3jw-yuhn
summary Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21248
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24337
published_at 2026-04-02T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24196
published_at 2026-04-16T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2437
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24153
published_at 2026-04-07T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-08T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24263
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2428
published_at 2026-04-11T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24237
published_at 2026-04-12T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.2418
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21248
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041801
reference_id 2041801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041801
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
reference_id 2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
reference_id 4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
21
reference_url https://www.debian.org/security/2022/dsa-5057
reference_id dsa-5057
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://www.debian.org/security/2022/dsa-5057
22
reference_url https://www.debian.org/security/2022/dsa-5058
reference_id dsa-5058
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://www.debian.org/security/2022/dsa-5058
23
reference_url https://security.gentoo.org/glsa/202209-05
reference_id GLSA-202209-05
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://security.gentoo.org/glsa/202209-05
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
reference_id KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
25
reference_url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
26
reference_url https://security.netapp.com/advisory/ntap-20220121-0007/
reference_id ntap-20220121-0007
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/
url https://security.netapp.com/advisory/ntap-20220121-0007/
27
reference_url https://access.redhat.com/errata/RHSA-2022:0161
reference_id RHSA-2022:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0161
28
reference_url https://access.redhat.com/errata/RHSA-2022:0165
reference_id RHSA-2022:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0165
29
reference_url https://access.redhat.com/errata/RHSA-2022:0166
reference_id RHSA-2022:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0166
30
reference_url https://access.redhat.com/errata/RHSA-2022:0185
reference_id RHSA-2022:0185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0185
31
reference_url https://access.redhat.com/errata/RHSA-2022:0204
reference_id RHSA-2022:0204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0204
32
reference_url https://access.redhat.com/errata/RHSA-2022:0209
reference_id RHSA-2022:0209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0209
33
reference_url https://access.redhat.com/errata/RHSA-2022:0211
reference_id RHSA-2022:0211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0211
34
reference_url https://access.redhat.com/errata/RHSA-2022:0228
reference_id RHSA-2022:0228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0228
35
reference_url https://access.redhat.com/errata/RHSA-2022:0229
reference_id RHSA-2022:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0229
36
reference_url https://access.redhat.com/errata/RHSA-2022:0233
reference_id RHSA-2022:0233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0233
37
reference_url https://access.redhat.com/errata/RHSA-2022:0304
reference_id RHSA-2022:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0304
38
reference_url https://access.redhat.com/errata/RHSA-2022:0305
reference_id RHSA-2022:0305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0305
39
reference_url https://access.redhat.com/errata/RHSA-2022:0306
reference_id RHSA-2022:0306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0306
40
reference_url https://access.redhat.com/errata/RHSA-2022:0307
reference_id RHSA-2022:0307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0307
41
reference_url https://access.redhat.com/errata/RHSA-2022:0312
reference_id RHSA-2022:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0312
42
reference_url https://access.redhat.com/errata/RHSA-2022:0317
reference_id RHSA-2022:0317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0317
43
reference_url https://access.redhat.com/errata/RHSA-2022:0321
reference_id RHSA-2022:0321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0321
44
reference_url https://access.redhat.com/errata/RHSA-2022:0968
reference_id RHSA-2022:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0968
45
reference_url https://access.redhat.com/errata/RHSA-2022:0969
reference_id RHSA-2022:0969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0969
46
reference_url https://access.redhat.com/errata/RHSA-2022:0970
reference_id RHSA-2022:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0970
47
reference_url https://usn.ubuntu.com/5313-1/
reference_id USN-5313-1
reference_type
scores
url https://usn.ubuntu.com/5313-1/
fixed_packages
aliases CVE-2022-21248
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqx-d3jw-yuhn
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.7.5-1%3Farch=el8_5