Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-m54j-wfuk-yua7
SummaryVulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Aliases
0
alias CVE-2026-22008
Fixed_packages
0
url pkg:deb/debian/openjdk-25@25.0.3%2B9-1?distro=trixie
purl pkg:deb/debian/openjdk-25@25.0.3%2B9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-25@25.0.3%252B9-1%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-25@25.0.3%2B9-2?distro=trixie
purl pkg:deb/debian/openjdk-25@25.0.3%2B9-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-25@25.0.3%252B9-2%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/openjdk-25@25.0.2%2B10-1~deb13u2?distro=trixie
purl pkg:deb/debian/openjdk-25@25.0.2%2B10-1~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-m54j-wfuk-yua7
5
vulnerability VCID-sz6r-65q1-q3bh
6
vulnerability VCID-xte1-h9nn-4bbk
7
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-25@25.0.2%252B10-1~deb13u2%3Fdistro=trixie
1
url pkg:deb/debian/openjdk-25@25.0.3~8ea-1?distro=trixie
purl pkg:deb/debian/openjdk-25@25.0.3~8ea-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-57sd-8y93-qqhu
2
vulnerability VCID-6r1k-8y1c-q7fm
3
vulnerability VCID-jxgd-j4wr-tyb7
4
vulnerability VCID-m54j-wfuk-yua7
5
vulnerability VCID-sz6r-65q1-q3bh
6
vulnerability VCID-xte1-h9nn-4bbk
7
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-25@25.0.3~8ea-1%3Fdistro=trixie
2
url pkg:rpm/redhat/java-25-openjdk@1:25.0.3.0.9-1?arch=el10_2
purl pkg:rpm/redhat/java-25-openjdk@1:25.0.3.0.9-1?arch=el10_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-41qj-62x6-tqe5
2
vulnerability VCID-57sd-8y93-qqhu
3
vulnerability VCID-6fzj-746j-bkbc
4
vulnerability VCID-6r1k-8y1c-q7fm
5
vulnerability VCID-dm7h-c7wt-1kbs
6
vulnerability VCID-jxgd-j4wr-tyb7
7
vulnerability VCID-m54j-wfuk-yua7
8
vulnerability VCID-ptgq-884e-mkft
9
vulnerability VCID-sz6r-65q1-q3bh
10
vulnerability VCID-xte1-h9nn-4bbk
11
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-25-openjdk@1:25.0.3.0.9-1%3Farch=el10_2
3
url pkg:rpm/redhat/java-25-openjdk@1:25.0.3.0.9-1?arch=el9
purl pkg:rpm/redhat/java-25-openjdk@1:25.0.3.0.9-1?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gha-995s-7qdg
1
vulnerability VCID-41qj-62x6-tqe5
2
vulnerability VCID-57sd-8y93-qqhu
3
vulnerability VCID-6fzj-746j-bkbc
4
vulnerability VCID-6r1k-8y1c-q7fm
5
vulnerability VCID-dm7h-c7wt-1kbs
6
vulnerability VCID-jxgd-j4wr-tyb7
7
vulnerability VCID-m54j-wfuk-yua7
8
vulnerability VCID-ptgq-884e-mkft
9
vulnerability VCID-sz6r-65q1-q3bh
10
vulnerability VCID-xte1-h9nn-4bbk
11
vulnerability VCID-zsun-4q6p-8fek
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-25-openjdk@1:25.0.3.0.9-1%3Farch=el9
4
url pkg:rpm/redhat/java-25-openjdk-main@25.0.2.0.10-5.1?arch=hum1
purl pkg:rpm/redhat/java-25-openjdk-main@25.0.2.0.10-5.1?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m54j-wfuk-yua7
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-25-openjdk-main@25.0.2.0.10-5.1%3Farch=hum1
5
url pkg:rpm/redhat/java-25-openjdk-portable-main@25.0.2.0.10-2.1?arch=hum1
purl pkg:rpm/redhat/java-25-openjdk-portable-main@25.0.2.0.10-2.1?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m54j-wfuk-yua7
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-25-openjdk-portable-main@25.0.2.0.10-2.1%3Farch=hum1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22008.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22008
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22008
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460029
reference_id 2460029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460029
4
reference_url https://www.oracle.com/security-alerts/cpuapr2026.html
reference_id cpuapr2026.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:05:38Z/
url https://www.oracle.com/security-alerts/cpuapr2026.html
5
reference_url https://access.redhat.com/errata/RHSA-2026:7286
reference_id RHSA-2026:7286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7286
6
reference_url https://access.redhat.com/errata/RHSA-2026:7311
reference_id RHSA-2026:7311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7311
7
reference_url https://access.redhat.com/errata/RHSA-2026:9693
reference_id RHSA-2026:9693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9693
8
reference_url https://access.redhat.com/errata/RHSA-2026:9694
reference_id RHSA-2026:9694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9694
Weaknesses
0
cwe_id 122
name Heap-based Buffer Overflow
description A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Exploits
Severity_range_score3.7 - 3.7
Exploitability0.5
Weighted_severity3.3
Risk_score1.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-m54j-wfuk-yua7