Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/99477?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/99477?format=api", "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.5.5-1jpp.1?arch=el7", "type": "rpm", "namespace": "redhat", "name": "java-1.7.1-ibm", "version": "1:1.7.1.5.5-1jpp.1", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34358?format=api", "vulnerability_id": "VCID-3aae-859j-1bg9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26473", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26494", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.265", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26472", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26434", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26373", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26366", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26311", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041417", "reference_id": "2041417", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041417" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21293" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3aae-859j-1bg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34372?format=api", "vulnerability_id": "VCID-3hj5-z3ck-tkha", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29356", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29469", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29563", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29608", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29633", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041785", "reference_id": "2041785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041785" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5057", "reference_id": "dsa-5057", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5057" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5058", "reference_id": "dsa-5058", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5058" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21365" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hj5-z3ck-tkha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34370?format=api", "vulnerability_id": "VCID-4thy-7844-xuc9", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29633", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29608", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29563", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29469", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29356", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29293", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041491", "reference_id": "2041491", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041491" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21360" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4thy-7844-xuc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34360?format=api", "vulnerability_id": "VCID-5xg6-kds9-g3hf", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29633", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29608", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29563", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29469", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29356", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29293", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041427", "reference_id": "2041427", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041427" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21294" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xg6-kds9-g3hf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34368?format=api", "vulnerability_id": "VCID-98bc-5jrc-5kas", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29614", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29633", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29608", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29563", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29469", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29356", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29293", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041897", "reference_id": "2041897", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041897" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21341" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98bc-5jrc-5kas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34350?format=api", "vulnerability_id": "VCID-p5ye-19wy-ayb8", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31435", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31477", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31485", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3157", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31453", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31474", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33078", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33159", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33331", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015311", "reference_id": "2015311", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015311" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://security.archlinux.org/AVG-2477", "reference_id": "AVG-2477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2477" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5012", "reference_id": "dsa-5012", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5012" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4135", "reference_id": "RHSA-2021:4135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4531", "reference_id": "RHSA-2021:4531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4532", "reference_id": "RHSA-2021:4532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35603" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ye-19wy-ayb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34338?format=api", "vulnerability_id": "VCID-rmqx-pseh-q7a7", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23303", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23166", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23142", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23201", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23259", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23151", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23159", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25549", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25556", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25606", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015648", "reference_id": "2015648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015648" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/", "reference_id": "6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/", "reference_id": "7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/" }, { "reference_url": "https://security.archlinux.org/AVG-2478", "reference_id": "AVG-2478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2478" }, { "reference_url": "https://security.archlinux.org/AVG-2479", "reference_id": "AVG-2479", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2479" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/", "reference_id": "DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5000", "reference_id": "dsa-5000", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5000" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://security.gentoo.org/glsa/202409-26", "reference_id": "GLSA-202409-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-26" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/", "reference_id": "GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/", "reference_id": "GXTUWAWXVU37GRNIG4TPMA47THO6VAE6", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3884", "reference_id": "RHSA-2021:3884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3885", "reference_id": "RHSA-2021:3885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3886", "reference_id": "RHSA-2021:3886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3887", "reference_id": "RHSA-2021:3887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3889", "reference_id": "RHSA-2021:3889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3889" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3891", "reference_id": "RHSA-2021:3891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3892", "reference_id": "RHSA-2021:3892", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3892" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3893", "reference_id": "RHSA-2021:3893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3960", "reference_id": "RHSA-2021:3960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3961", "reference_id": "RHSA-2021:3961", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3967", "reference_id": "RHSA-2021:3967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3968", "reference_id": "RHSA-2021:3968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5202-1/", "reference_id": "USN-5202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5202-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/", "reference_id": "V362B2BWTH5IJDL45QPQGMBKIQOG7JX5", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35550" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmqx-pseh-q7a7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34367?format=api", "vulnerability_id": "VCID-tr4r-wm4s-auej", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91031", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.9104", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91067", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91091", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91093", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91104", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06446", "scoring_system": "epss", "scoring_elements": "0.91099", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041884", "reference_id": "2041884", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041884" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21340" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tr4r-wm4s-auej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34351?format=api", "vulnerability_id": "VCID-xfqx-d3jw-yuhn", "summary": "Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.23985", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24263", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2428", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24196", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24183", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2416", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24025", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041801", "reference_id": "2041801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041801" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/", "reference_id": "2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/", "reference_id": "4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5057", "reference_id": "dsa-5057", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5057" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5058", "reference_id": "dsa-5058", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5058" }, { "reference_url": "https://security.gentoo.org/glsa/202209-05", "reference_id": "GLSA-202209-05", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://security.gentoo.org/glsa/202209-05" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/", "reference_id": "KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0007/", "reference_id": "ntap-20220121-0007", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0161", "reference_id": "RHSA-2022:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0165", "reference_id": "RHSA-2022:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0166", "reference_id": "RHSA-2022:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0185", "reference_id": "RHSA-2022:0185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0204", "reference_id": "RHSA-2022:0204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0209", "reference_id": "RHSA-2022:0209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0211", "reference_id": "RHSA-2022:0211", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0211" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0228", "reference_id": "RHSA-2022:0228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0229", "reference_id": "RHSA-2022:0229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0233", "reference_id": "RHSA-2022:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0304", "reference_id": "RHSA-2022:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0305", "reference_id": "RHSA-2022:0305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0306", "reference_id": "RHSA-2022:0306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0307", "reference_id": "RHSA-2022:0307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0312", "reference_id": "RHSA-2022:0312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0317", "reference_id": "RHSA-2022:0317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0321", "reference_id": "RHSA-2022:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0968", "reference_id": "RHSA-2022:0968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0969", "reference_id": "RHSA-2022:0969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0970", "reference_id": "RHSA-2022:0970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0970" }, { "reference_url": "https://usn.ubuntu.com/5313-1/", "reference_id": "USN-5313-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5313-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21248" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqx-d3jw-yuhn" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.5.5-1jpp.1%3Farch=el7" }