Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-mw4a-31ag-6udf
SummaryVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u401; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
Aliases
0
alias CVE-2024-21003
Fixed_packages
0
url pkg:deb/debian/openjfx@0?distro=trixie
purl pkg:deb/debian/openjfx@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@0%3Fdistro=trixie
1
url pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B0-1%3Fdistro=trixie
2
url pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-3%3Fdistro=trixie
3
url pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
purl pkg:deb/debian/openjfx@11.0.11%2B1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.11%252B1-7%3Fdistro=trixie
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21003
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42545
published_at 2026-04-26T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42655
published_at 2026-04-12T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42638
published_at 2026-04-13T12:55:00Z
3
value 0.00205
scoring_system epss
scoring_elements 0.42698
published_at 2026-04-16T12:55:00Z
4
value 0.00205
scoring_system epss
scoring_elements 0.42684
published_at 2026-04-18T12:55:00Z
5
value 0.00205
scoring_system epss
scoring_elements 0.42621
published_at 2026-04-21T12:55:00Z
6
value 0.00205
scoring_system epss
scoring_elements 0.42637
published_at 2026-04-02T12:55:00Z
7
value 0.00205
scoring_system epss
scoring_elements 0.42665
published_at 2026-04-04T12:55:00Z
8
value 0.00205
scoring_system epss
scoring_elements 0.42605
published_at 2026-04-07T12:55:00Z
9
value 0.00205
scoring_system epss
scoring_elements 0.42657
published_at 2026-04-08T12:55:00Z
10
value 0.00205
scoring_system epss
scoring_elements 0.42668
published_at 2026-04-09T12:55:00Z
11
value 0.00205
scoring_system epss
scoring_elements 0.42692
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21003
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*
5
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:05:54Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:05:54Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
Weaknesses
Exploits
Severity_range_score3.1 - 3.1
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-mw4a-31ag-6udf