{"url":"http://public2.vulnerablecode.io/api/packages/1037801?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.4%2B11-1~deb10u1","type":"deb","namespace":"debian","name":"openjdk-11","version":"11.0.4+11-1~deb10u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"11.0.31~10ea-1","latest_non_vulnerable_version":"11.0.31~10ea-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70352?format=json","vulnerability_id":"VCID-11vj-5zz4-6fe7","summary":"openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30698.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30698","reference_id":"","reference_type":"","scores":[{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6956","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69611","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897","reference_id":"1103897","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898","reference_id":"1103898","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899","reference_id":"1103899","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900","reference_id":"1103900","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359693","reference_id":"2359693","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359693"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:13:36Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3844","reference_id":"RHSA-2025:3844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3845","reference_id":"RHSA-2025:3845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3846","reference_id":"RHSA-2025:3846","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3846"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3847","reference_id":"RHSA-2025:3847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3848","reference_id":"RHSA-2025:3848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3849","reference_id":"RHSA-2025:3849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3850","reference_id":"RHSA-2025:3850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3852","reference_id":"RHSA-2025:3852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3853","reference_id":"RHSA-2025:3853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3854","reference_id":"RHSA-2025:3854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3855","reference_id":"RHSA-2025:3855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3856","reference_id":"RHSA-2025:3856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3857","reference_id":"RHSA-2025:3857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7508","reference_id":"RHSA-2025:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8063","reference_id":"RHSA-2025:8063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8431","reference_id":"RHSA-2025:8431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8431"},{"reference_url":"https://usn.ubuntu.com/7480-1/","reference_id":"USN-7480-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7480-1/"},{"reference_url":"https://usn.ubuntu.com/7481-1/","reference_id":"USN-7481-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7481-1/"},{"reference_url":"https://usn.ubuntu.com/7482-1/","reference_id":"USN-7482-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7482-1/"},{"reference_url":"https://usn.ubuntu.com/7483-1/","reference_id":"USN-7483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7483-1/"},{"reference_url":"https://usn.ubuntu.com/7484-1/","reference_id":"USN-7484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7484-1/"},{"reference_url":"https://usn.ubuntu.com/7531-1/","reference_id":"USN-7531-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7531-1/"},{"reference_url":"https://usn.ubuntu.com/7533-1/","reference_id":"USN-7533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7533-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-30698"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-11vj-5zz4-6fe7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66833?format=json","vulnerability_id":"VCID-13t7-vubq-8kae","summary":"openjdk: Enhance certificate handling (Oracle CPU 2025-10)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53057.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53057","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22666","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22612","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53057"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944","reference_id":"1118944","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403082","reference_id":"2403082","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403082"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T14:46:38Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18814","reference_id":"RHSA-2025:18814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18815","reference_id":"RHSA-2025:18815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18816","reference_id":"RHSA-2025:18816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18817","reference_id":"RHSA-2025:18817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18818","reference_id":"RHSA-2025:18818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18819","reference_id":"RHSA-2025:18819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18820","reference_id":"RHSA-2025:18820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18821","reference_id":"RHSA-2025:18821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18822","reference_id":"RHSA-2025:18822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18823","reference_id":"RHSA-2025:18823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18824","reference_id":"RHSA-2025:18824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18825","reference_id":"RHSA-2025:18825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18826","reference_id":"RHSA-2025:18826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21485","reference_id":"RHSA-2025:21485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22370","reference_id":"RHSA-2025:22370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22672","reference_id":"RHSA-2025:22672","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22672"},{"reference_url":"https://usn.ubuntu.com/7881-1/","reference_id":"USN-7881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7881-1/"},{"reference_url":"https://usn.ubuntu.com/7882-1/","reference_id":"USN-7882-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7882-1/"},{"reference_url":"https://usn.ubuntu.com/7883-1/","reference_id":"USN-7883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7883-1/"},{"reference_url":"https://usn.ubuntu.com/7884-1/","reference_id":"USN-7884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7884-1/"},{"reference_url":"https://usn.ubuntu.com/7885-1/","reference_id":"USN-7885-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7885-1/"},{"reference_url":"https://usn.ubuntu.com/7900-1/","reference_id":"USN-7900-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7900-1/"},{"reference_url":"https://usn.ubuntu.com/7901-1/","reference_id":"USN-7901-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7901-1/"},{"reference_url":"https://usn.ubuntu.com/7902-1/","reference_id":"USN-7902-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7902-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-53057"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13t7-vubq-8kae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79485?format=json","vulnerability_id":"VCID-1d6t-ndfc-m7hg","summary":"OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21443","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18111","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18174","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18126","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075793","reference_id":"2075793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075793"},{"reference_url":"https://security.archlinux.org/AVG-2686","reference_id":"AVG-2686","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2686"},{"reference_url":"https://security.archlinux.org/AVG-2687","reference_id":"AVG-2687","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2687"},{"reference_url":"https://security.archlinux.org/AVG-2688","reference_id":"AVG-2688","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2688"},{"reference_url":"https://security.archlinux.org/AVG-2689","reference_id":"AVG-2689","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2689"},{"reference_url":"https://www.debian.org/security/2022/dsa-5128","reference_id":"dsa-5128","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/"}],"url":"https://www.debian.org/security/2022/dsa-5128"},{"reference_url":"https://www.debian.org/security/2022/dsa-5131","reference_id":"dsa-5131","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/"}],"url":"https://www.debian.org/security/2022/dsa-5131"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0006/","reference_id":"ntap-20220429-0006","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:31:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1435","reference_id":"RHSA-2022:1435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1436","reference_id":"RHSA-2022:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1437","reference_id":"RHSA-2022:1437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1438","reference_id":"RHSA-2022:1438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1439","reference_id":"RHSA-2022:1439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1440","reference_id":"RHSA-2022:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1441","reference_id":"RHSA-2022:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1442","reference_id":"RHSA-2022:1442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1443","reference_id":"RHSA-2022:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1444","reference_id":"RHSA-2022:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1445","reference_id":"RHSA-2022:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1487","reference_id":"RHSA-2022:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1488","reference_id":"RHSA-2022:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1489","reference_id":"RHSA-2022:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1490","reference_id":"RHSA-2022:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1491","reference_id":"RHSA-2022:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1492","reference_id":"RHSA-2022:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1728","reference_id":"RHSA-2022:1728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1729","reference_id":"RHSA-2022:1729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2137","reference_id":"RHSA-2022:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4957","reference_id":"RHSA-2022:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4959","reference_id":"RHSA-2022:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5837","reference_id":"RHSA-2022:5837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5837"},{"reference_url":"https://usn.ubuntu.com/5388-1/","reference_id":"USN-5388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-1/"},{"reference_url":"https://usn.ubuntu.com/5388-2/","reference_id":"USN-5388-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-2/"},{"reference_url":"https://usn.ubuntu.com/5546-1/","reference_id":"USN-5546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-1/"},{"reference_url":"https://usn.ubuntu.com/5546-2/","reference_id":"USN-5546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21443"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1d6t-ndfc-m7hg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39541?format=json","vulnerability_id":"VCID-1nr6-3bq8-nbfn","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2590.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2590","reference_id":"","reference_type":"","scores":[{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63596","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63644","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790556","reference_id":"1790556","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790556"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:44Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2590"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1nr6-3bq8-nbfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34332?format=json","vulnerability_id":"VCID-1pdg-7bbt-kqfz","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2341","reference_id":"","reference_type":"","scores":[{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59239","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59384","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59367","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1982874","reference_id":"1982874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1982874"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/","reference_id":"A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/"},{"reference_url":"https://security.archlinux.org/ASA-202107-53","reference_id":"ASA-202107-53","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-53"},{"reference_url":"https://security.archlinux.org/ASA-202107-54","reference_id":"ASA-202107-54","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-54"},{"reference_url":"https://security.archlinux.org/ASA-202107-65","reference_id":"ASA-202107-65","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-65"},{"reference_url":"https://security.archlinux.org/ASA-202107-66","reference_id":"ASA-202107-66","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-66"},{"reference_url":"https://security.archlinux.org/AVG-2188","reference_id":"AVG-2188","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2188"},{"reference_url":"https://security.archlinux.org/AVG-2189","reference_id":"AVG-2189","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2189"},{"reference_url":"https://security.archlinux.org/AVG-2190","reference_id":"AVG-2190","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2190"},{"reference_url":"https://www.debian.org/security/2021/dsa-4946","reference_id":"dsa-4946","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/"}],"url":"https://www.debian.org/security/2021/dsa-4946"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/","reference_id":"N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210723-0002/","reference_id":"ntap-20210723-0002","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210723-0002/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/","reference_id":"PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2774","reference_id":"RHSA-2021:2774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2775","reference_id":"RHSA-2021:2775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2776","reference_id":"RHSA-2021:2776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2777","reference_id":"RHSA-2021:2777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2778","reference_id":"RHSA-2021:2778","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2779","reference_id":"RHSA-2021:2779","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2780","reference_id":"RHSA-2021:2780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2781","reference_id":"RHSA-2021:2781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2782","reference_id":"RHSA-2021:2782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2783","reference_id":"RHSA-2021:2783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2784","reference_id":"RHSA-2021:2784","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2845","reference_id":"RHSA-2021:2845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3292","reference_id":"RHSA-2021:3292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3293","reference_id":"RHSA-2021:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4089","reference_id":"RHSA-2021:4089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4089"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/","reference_id":"VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-2341"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1pdg-7bbt-kqfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39545?format=json","vulnerability_id":"VCID-2ggq-ccut-5ycs","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2601.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2601","reference_id":"","reference_type":"","scores":[{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72307","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72281","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72341","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72334","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72322","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790570","reference_id":"1790570","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790570"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:27Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2601"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ggq-ccut-5ycs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76844?format=json","vulnerability_id":"VCID-2tju-1r8k-sbf9","summary":"OpenJDK: C2 compilation fails with \"Exceeded _node_regs array\" (8317507)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21094.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21094","reference_id":"","reference_type":"","scores":[{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61787","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61775","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678","reference_id":"1069678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275005","reference_id":"2275005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275005"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html","reference_id":"msg00014.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0004/","reference_id":"ntap-20240426-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T13:58:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0248","reference_id":"RHSA-2024:0248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0249","reference_id":"RHSA-2024:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1815","reference_id":"RHSA-2024:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1816","reference_id":"RHSA-2024:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1817","reference_id":"RHSA-2024:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1818","reference_id":"RHSA-2024:1818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1819","reference_id":"RHSA-2024:1819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1820","reference_id":"RHSA-2024:1820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1821","reference_id":"RHSA-2024:1821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1822","reference_id":"RHSA-2024:1822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1823","reference_id":"RHSA-2024:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1824","reference_id":"RHSA-2024:1824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1825","reference_id":"RHSA-2024:1825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1826","reference_id":"RHSA-2024:1826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1828","reference_id":"RHSA-2024:1828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1828"},{"reference_url":"https://usn.ubuntu.com/6810-1/","reference_id":"USN-6810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6810-1/"},{"reference_url":"https://usn.ubuntu.com/6811-1/","reference_id":"USN-6811-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6811-1/"},{"reference_url":"https://usn.ubuntu.com/6812-1/","reference_id":"USN-6812-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6812-1/"},{"reference_url":"https://usn.ubuntu.com/6813-1/","reference_id":"USN-6813-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6813-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21094"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2tju-1r8k-sbf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45991?format=json","vulnerability_id":"VCID-2wfy-nmqn-mkfe","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2805.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2805","reference_id":"","reference_type":"","scores":[{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82902","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82877","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.8288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.8292","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82851","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01833","scoring_system":"epss","scoring_elements":"0.82909","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823844","reference_id":"1823844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823844"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2805","reference_id":"CVE-2020-2805","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2805"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1507","reference_id":"RHSA-2020:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1508","reference_id":"RHSA-2020:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:30Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2805"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2wfy-nmqn-mkfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81425?format=json","vulnerability_id":"VCID-347b-v3k9-b7cp","summary":"OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2767.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2767.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2767","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55853","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55845","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823947","reference_id":"1823947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823947"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2767","reference_id":"CVE-2020-2767","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:51Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2767"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-347b-v3k9-b7cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79376?format=json","vulnerability_id":"VCID-39gh-uwky-kke9","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2973.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2973","reference_id":"","reference_type":"","scores":[{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68725","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68706","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68773","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760978","reference_id":"1760978","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760978"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2973","reference_id":"CVE-2019-2973","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:07Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2973"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39gh-uwky-kke9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34358?format=json","vulnerability_id":"VCID-3aae-859j-1bg9","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21293","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26644","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2659","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26494","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041417","reference_id":"2041417","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041417"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21293"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3aae-859j-1bg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34333?format=json","vulnerability_id":"VCID-3b1m-995s-r7a8","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2369","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56676","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56809","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1982879","reference_id":"1982879","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1982879"},{"reference_url":"https://security.archlinux.org/ASA-202107-53","reference_id":"ASA-202107-53","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-53"},{"reference_url":"https://security.archlinux.org/ASA-202107-54","reference_id":"ASA-202107-54","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-54"},{"reference_url":"https://security.archlinux.org/ASA-202107-65","reference_id":"ASA-202107-65","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-65"},{"reference_url":"https://security.archlinux.org/ASA-202107-66","reference_id":"ASA-202107-66","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-66"},{"reference_url":"https://security.archlinux.org/AVG-2188","reference_id":"AVG-2188","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2188"},{"reference_url":"https://security.archlinux.org/AVG-2189","reference_id":"AVG-2189","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2189"},{"reference_url":"https://security.archlinux.org/AVG-2190","reference_id":"AVG-2190","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2190"},{"reference_url":"https://www.debian.org/security/2021/dsa-4946","reference_id":"dsa-4946","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/"}],"url":"https://www.debian.org/security/2021/dsa-4946"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210723-0002/","reference_id":"ntap-20210723-0002","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210723-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2774","reference_id":"RHSA-2021:2774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2775","reference_id":"RHSA-2021:2775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2776","reference_id":"RHSA-2021:2776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2777","reference_id":"RHSA-2021:2777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2778","reference_id":"RHSA-2021:2778","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2779","reference_id":"RHSA-2021:2779","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2780","reference_id":"RHSA-2021:2780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2781","reference_id":"RHSA-2021:2781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2782","reference_id":"RHSA-2021:2782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2783","reference_id":"RHSA-2021:2783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2784","reference_id":"RHSA-2021:2784","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2845","reference_id":"RHSA-2021:2845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3292","reference_id":"RHSA-2021:3292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3293","reference_id":"RHSA-2021:3293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4089","reference_id":"RHSA-2021:4089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4089"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-2369"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3b1m-995s-r7a8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34372?format=json","vulnerability_id":"VCID-3hj5-z3ck-tkha","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21365","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29706","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041785","reference_id":"2041785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041785"},{"reference_url":"https://www.debian.org/security/2022/dsa-5057","reference_id":"dsa-5057","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/"}],"url":"https://www.debian.org/security/2022/dsa-5057"},{"reference_url":"https://www.debian.org/security/2022/dsa-5058","reference_id":"dsa-5058","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/"}],"url":"https://www.debian.org/security/2022/dsa-5058"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0007/","reference_id":"ntap-20220121-0007","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:59:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21365"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3hj5-z3ck-tkha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34432?format=json","vulnerability_id":"VCID-3tav-ffar-hfhb","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21843.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21843","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30613","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3075","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160475","reference_id":"2160475","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160475"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0190","reference_id":"RHSA-2023:0190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0191","reference_id":"RHSA-2023:0191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0192","reference_id":"RHSA-2023:0192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0193","reference_id":"RHSA-2023:0193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0194","reference_id":"RHSA-2023:0194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0195","reference_id":"RHSA-2023:0195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0196","reference_id":"RHSA-2023:0196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0197","reference_id":"RHSA-2023:0197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0198","reference_id":"RHSA-2023:0198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0199","reference_id":"RHSA-2023:0199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0200","reference_id":"RHSA-2023:0200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0201","reference_id":"RHSA-2023:0201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0202","reference_id":"RHSA-2023:0202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0203","reference_id":"RHSA-2023:0203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0204","reference_id":"RHSA-2023:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0205","reference_id":"RHSA-2023:0205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0206","reference_id":"RHSA-2023:0206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0207","reference_id":"RHSA-2023:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0208","reference_id":"RHSA-2023:0208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0209","reference_id":"RHSA-2023:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0210","reference_id":"RHSA-2023:0210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0352","reference_id":"RHSA-2023:0352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0353","reference_id":"RHSA-2023:0353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0354","reference_id":"RHSA-2023:0354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0387","reference_id":"RHSA-2023:0387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0388","reference_id":"RHSA-2023:0388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0389","reference_id":"RHSA-2023:0389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3136","reference_id":"RHSA-2023:3136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3136"},{"reference_url":"https://usn.ubuntu.com/5897-1/","reference_id":"USN-5897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5897-1/"},{"reference_url":"https://usn.ubuntu.com/5898-1/","reference_id":"USN-5898-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5898-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21843"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3tav-ffar-hfhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34416?format=json","vulnerability_id":"VCID-3v2y-qzfu-nydb","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14779","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42091","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42042","published_at":"2026-04-01T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42131","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42119","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42115","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889271","reference_id":"1889271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889271"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/","reference_id":"N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/","reference_id":"OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0530","reference_id":"RHSA-2021:0530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0530"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/","reference_id":"XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/","reference_id":"XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/","reference_id":"YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/","reference_id":"Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14779"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3v2y-qzfu-nydb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60300?format=json","vulnerability_id":"VCID-47ae-xdqr-6qgb","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21540","reference_id":"","reference_type":"","scores":[{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.6268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62752","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108540","reference_id":"2108540","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5681","reference_id":"RHSA-2022:5681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5683","reference_id":"RHSA-2022:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5684","reference_id":"RHSA-2022:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5685","reference_id":"RHSA-2022:5685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5687","reference_id":"RHSA-2022:5687","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5687"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5695","reference_id":"RHSA-2022:5695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5696","reference_id":"RHSA-2022:5696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5697","reference_id":"RHSA-2022:5697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5698","reference_id":"RHSA-2022:5698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5700","reference_id":"RHSA-2022:5700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5701","reference_id":"RHSA-2022:5701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5709","reference_id":"RHSA-2022:5709","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5709"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5726","reference_id":"RHSA-2022:5726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5736","reference_id":"RHSA-2022:5736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5753","reference_id":"RHSA-2022:5753","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5754","reference_id":"RHSA-2022:5754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5755","reference_id":"RHSA-2022:5755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5756","reference_id":"RHSA-2022:5756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5757","reference_id":"RHSA-2022:5757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5758","reference_id":"RHSA-2022:5758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5758"},{"reference_url":"https://usn.ubuntu.com/5546-1/","reference_id":"USN-5546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-1/"},{"reference_url":"https://usn.ubuntu.com/5546-2/","reference_id":"USN-5546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2022-21540"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-47ae-xdqr-6qgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64943?format=json","vulnerability_id":"VCID-4snj-etwf-eqe8","summary":"openjdk: Improve HttpServer Request handling (Oracle CPU 2026-01)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21933","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09077","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09091","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0909","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119","reference_id":"1126119","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429926","reference_id":"2429926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429926"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:56:13Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0847","reference_id":"RHSA-2026:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0848","reference_id":"RHSA-2026:0848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0849","reference_id":"RHSA-2026:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0895","reference_id":"RHSA-2026:0895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0896","reference_id":"RHSA-2026:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0897","reference_id":"RHSA-2026:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0898","reference_id":"RHSA-2026:0898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0899","reference_id":"RHSA-2026:0899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0900","reference_id":"RHSA-2026:0900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0901","reference_id":"RHSA-2026:0901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0927","reference_id":"RHSA-2026:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0928","reference_id":"RHSA-2026:0928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0931","reference_id":"RHSA-2026:0931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0932","reference_id":"RHSA-2026:0932","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0932"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0933","reference_id":"RHSA-2026:0933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1606","reference_id":"RHSA-2026:1606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4832","reference_id":"RHSA-2026:4832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4832"},{"reference_url":"https://usn.ubuntu.com/7995-1/","reference_id":"USN-7995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7995-1/"},{"reference_url":"https://usn.ubuntu.com/7996-1/","reference_id":"USN-7996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7996-1/"},{"reference_url":"https://usn.ubuntu.com/7997-1/","reference_id":"USN-7997-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7997-1/"},{"reference_url":"https://usn.ubuntu.com/7998-1/","reference_id":"USN-7998-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7998-1/"},{"reference_url":"https://usn.ubuntu.com/8000-1/","reference_id":"USN-8000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8000-1/"},{"reference_url":"https://usn.ubuntu.com/8001-1/","reference_id":"USN-8001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8001-1/"},{"reference_url":"https://usn.ubuntu.com/8002-1/","reference_id":"USN-8002-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8002-1/"},{"reference_url":"https://usn.ubuntu.com/8003-1/","reference_id":"USN-8003-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8003-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2026-21933"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4snj-etwf-eqe8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34370?format=json","vulnerability_id":"VCID-4thy-7844-xuc9","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21360","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29706","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29614","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041491","reference_id":"2041491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041491"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21360"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4thy-7844-xuc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34406?format=json","vulnerability_id":"VCID-4trq-2j9e-bbfd","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14577.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14577.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14577","reference_id":"","reference_type":"","scores":[{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51626","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51677","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51702","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.5174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51713","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856988","reference_id":"1856988","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856988"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","reference_id":"6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","reference_id":"DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","reference_id":"MEPHBZPNSLX43B26DWKB7OS6AROTS2BO","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","reference_id":"QQUMIAON2YEFRONMIUVHAKYCIOLICDBA","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2968","reference_id":"RHSA-2020:2968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2969","reference_id":"RHSA-2020:2969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2970","reference_id":"RHSA-2020:2970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2972","reference_id":"RHSA-2020:2972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2985","reference_id":"RHSA-2020:2985","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3098","reference_id":"RHSA-2020:3098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3099","reference_id":"RHSA-2020:3099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3100","reference_id":"RHSA-2020:3100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3101","reference_id":"RHSA-2020:3101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4433-1/","reference_id":"USN-4433-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://usn.ubuntu.com/4433-1/"},{"reference_url":"https://usn.ubuntu.com/4453-1/","reference_id":"USN-4453-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:56Z/"}],"url":"https://usn.ubuntu.com/4453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14577"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4trq-2j9e-bbfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74702?format=json","vulnerability_id":"VCID-5et1-ytak-xqh7","summary":"OpenJDK: Excessive symbol length can lead to infinite loop (8319859)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21138","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.5617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56165","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.5621","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56144","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297962","reference_id":"2297962","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297962"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240719-0008/","reference_id":"ntap-20240719-0008","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240719-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4560","reference_id":"RHSA-2024:4560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4561","reference_id":"RHSA-2024:4561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4562","reference_id":"RHSA-2024:4562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4563","reference_id":"RHSA-2024:4563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4564","reference_id":"RHSA-2024:4564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4565","reference_id":"RHSA-2024:4565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4566","reference_id":"RHSA-2024:4566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4567","reference_id":"RHSA-2024:4567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4568","reference_id":"RHSA-2024:4568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4569","reference_id":"RHSA-2024:4569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4570","reference_id":"RHSA-2024:4570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4571","reference_id":"RHSA-2024:4571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4572","reference_id":"RHSA-2024:4572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4573","reference_id":"RHSA-2024:4573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4573"},{"reference_url":"https://usn.ubuntu.com/6929-1/","reference_id":"USN-6929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6929-1/"},{"reference_url":"https://usn.ubuntu.com/6930-1/","reference_id":"USN-6930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6930-1/"},{"reference_url":"https://usn.ubuntu.com/6931-1/","reference_id":"USN-6931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6931-1/"},{"reference_url":"https://usn.ubuntu.com/6932-1/","reference_id":"USN-6932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6932-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21138"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5et1-ytak-xqh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81918?format=json","vulnerability_id":"VCID-5wj6-ejpa-3kft","summary":"OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2977.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2977","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75794","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761002","reference_id":"1761002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761002"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2977","reference_id":"CVE-2019-2977","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"},{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2977"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:00Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2977"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5wj6-ejpa-3kft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34360?format=json","vulnerability_id":"VCID-5xg6-kds9-g3hf","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21294","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29706","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29614","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041427","reference_id":"2041427","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041427"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21294"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xg6-kds9-g3hf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31982?format=json","vulnerability_id":"VCID-6196-gvhx-ruh8","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21235","reference_id":"","reference_type":"","scores":[{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38305","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38355","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.3838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44158","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696","reference_id":"1085696","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318534","reference_id":"2318534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318534"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10926","reference_id":"RHSA-2024:10926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8116","reference_id":"RHSA-2024:8116","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8117","reference_id":"RHSA-2024:8117","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8117"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8118","reference_id":"RHSA-2024:8118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8119","reference_id":"RHSA-2024:8119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8120","reference_id":"RHSA-2024:8120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8121","reference_id":"RHSA-2024:8121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8122","reference_id":"RHSA-2024:8122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8123","reference_id":"RHSA-2024:8123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8124","reference_id":"RHSA-2024:8124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8125","reference_id":"RHSA-2024:8125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8126","reference_id":"RHSA-2024:8126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8127","reference_id":"RHSA-2024:8127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8128","reference_id":"RHSA-2024:8128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8129","reference_id":"RHSA-2024:8129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8129"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"},{"reference_url":"https://usn.ubuntu.com/7099-1/","reference_id":"USN-7099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7099-1/"},{"reference_url":"https://usn.ubuntu.com/7124-1/","reference_id":"USN-7124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7124-1/"},{"reference_url":"https://usn.ubuntu.com/7338-1/","reference_id":"USN-7338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7338-1/"},{"reference_url":"https://usn.ubuntu.com/7339-1/","reference_id":"USN-7339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7339-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2024-21235"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6196-gvhx-ruh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34344?format=json","vulnerability_id":"VCID-61c5-8468-33c8","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35565","reference_id":"","reference_type":"","scores":[{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35925","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35997","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36023","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35982","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36116","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014508","reference_id":"2014508","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014508"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/","reference_id":"7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/","reference_id":"DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5030","reference_id":"RHSA-2021:5030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0310","reference_id":"RHSA-2022:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0345","reference_id":"RHSA-2022:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0345"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/","reference_id":"V362B2BWTH5IJDL45QPQGMBKIQOG7JX5","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35565"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-61c5-8468-33c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79382?format=json","vulnerability_id":"VCID-64zz-esk6-y3fy","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2988.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2988.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2988","reference_id":"","reference_type":"","scores":[{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66484","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66568","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00514","scoring_system":"epss","scoring_elements":"0.66556","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760999","reference_id":"1760999","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760999"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2988","reference_id":"CVE-2019-2988","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:43Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2988"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-64zz-esk6-y3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79361?format=json","vulnerability_id":"VCID-68ap-6w4m-83dg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2762.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2762.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2762","reference_id":"","reference_type":"","scores":[{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.7084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70897","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730415","reference_id":"1730415","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730415"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"cpujul2019-5072835.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300","reference_id":"index?page=content&id=SB10300","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1810","reference_id":"RHSA-2019:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1811","reference_id":"RHSA-2019:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1815","reference_id":"RHSA-2019:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1816","reference_id":"RHSA-2019:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1817","reference_id":"RHSA-2019:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1839","reference_id":"RHSA-2019:1839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1840","reference_id":"RHSA-2019:1840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2494","reference_id":"RHSA-2019:2494","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2495","reference_id":"RHSA-2019:2495","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2585","reference_id":"RHSA-2019:2585","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2590","reference_id":"RHSA-2019:2590","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2592","reference_id":"RHSA-2019:2592","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2737","reference_id":"RHSA-2019:2737","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2737"},{"reference_url":"https://usn.ubuntu.com/4080-1/","reference_id":"USN-4080-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://usn.ubuntu.com/4080-1/"},{"reference_url":"https://usn.ubuntu.com/4083-1/","reference_id":"USN-4083-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:03Z/"}],"url":"https://usn.ubuntu.com/4083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037802?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.4%2B11-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-1d6t-ndfc-m7hg"},{"vulnerability":"VCID-1nr6-3bq8-nbfn"},{"vulnerability":"VCID-1pdg-7bbt-kqfz"},{"vulnerability":"VCID-2ggq-ccut-5ycs"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-2wfy-nmqn-mkfe"},{"vulnerability":"VCID-347b-v3k9-b7cp"},{"vulnerability":"VCID-39gh-uwky-kke9"},{"vulnerability":"VCID-3aae-859j-1bg9"},{"vulnerability":"VCID-3b1m-995s-r7a8"},{"vulnerability":"VCID-3hj5-z3ck-tkha"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-3v2y-qzfu-nydb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-4thy-7844-xuc9"},{"vulnerability":"VCID-4trq-2j9e-bbfd"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-5wj6-ejpa-3kft"},{"vulnerability":"VCID-5xg6-kds9-g3hf"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-64zz-esk6-y3fy"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6ywn-1kuf-1ufb"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-74uc-nfy5-fbfx"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-7913-mqsn-3bd8"},{"vulnerability":"VCID-7c1s-f99n-bfds"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8fmy-hu1v-nqct"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-93n5-e3u3-kugs"},{"vulnerability":"VCID-95d9-a86j-tkdy"},{"vulnerability":"VCID-97bv-kegv-uyd9"},{"vulnerability":"VCID-98bc-5jrc-5kas"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a129-wbcc-yqec"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-a95g-84vs-xbav"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-cena-jspa-2ba7"},{"vulnerability":"VCID-chp9-6c8n-xufp"},{"vulnerability":"VCID-d6wf-827v-a7c3"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-ey12-2uq3-6bar"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-g2fj-4mgh-23fs"},{"vulnerability":"VCID-gfxx-m9ud-rybe"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-he8f-erpk-sqh8"},{"vulnerability":"VCID-hg8h-z7af-pqe3"},{"vulnerability":"VCID-hmzc-b2h5-ryh2"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-htq1-a17u-4bh3"},{"vulnerability":"VCID-hx4c-96gx-2fbq"},{"vulnerability":"VCID-jc9v-4116-4yas"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jr6p-7nkg-1fe9"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-k3xn-hbrs-nkab"},{"vulnerability":"VCID-kd25-3buc-cqdy"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-m3j8-8gff-6fg4"},{"vulnerability":"VCID-mh6k-v939-m7hj"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-mumk-x95v-bfc8"},{"vulnerability":"VCID-muvh-c3he-1bax"},{"vulnerability":"VCID-mwfy-hus1-37gt"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-ne6z-gg9f-qkcy"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nw7e-6j5f-ebfa"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p5ye-19wy-ayb8"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-psrh-rb6j-afh7"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rgbz-akft-f7e6"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-rmqx-pseh-q7a7"},{"vulnerability":"VCID-rpdj-d7je-47cs"},{"vulnerability":"VCID-s4d4-pvtj-8ucp"},{"vulnerability":"VCID-shg1-t3nh-67hk"},{"vulnerability":"VCID-spnj-gvva-efet"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-tekc-e66p-tyba"},{"vulnerability":"VCID-tkw1-8js4-h7cw"},{"vulnerability":"VCID-tna8-m3b1-nkhn"},{"vulnerability":"VCID-tpng-ppye-m7hv"},{"vulnerability":"VCID-tr4r-wm4s-auej"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-upb2-1jmf-3udy"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-vssb-tgq1-p3g8"},{"vulnerability":"VCID-wfjr-ddp6-mkd5"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-wrfc-9msj-hqbc"},{"vulnerability":"VCID-ws4h-edpn-nudd"},{"vulnerability":"VCID-wyfq-yjf2-c7dy"},{"vulnerability":"VCID-wz73-dwgr-3bf7"},{"vulnerability":"VCID-x3wp-bdkr-7fa8"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xfqx-d3jw-yuhn"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-xrec-qf6z-2ua9"},{"vulnerability":"VCID-y5qu-j3wt-wuej"},{"vulnerability":"VCID-y78f-qgn6-rua7"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-y8wp-rpgd-kfht"},{"vulnerability":"VCID-ycgg-4fpn-b3at"},{"vulnerability":"VCID-yqsu-y2mw-pqgt"},{"vulnerability":"VCID-yvf2-2a33-zqat"},{"vulnerability":"VCID-yxk8-59zb-y7g2"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zh9v-47ue-p7ep"},{"vulnerability":"VCID-zkz6-9t74-5bb4"},{"vulnerability":"VCID-zr4f-wpm3-f3an"},{"vulnerability":"VCID-ztx2-xh6v-nke1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.4%252B11-1"}],"aliases":["CVE-2019-2762"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68ap-6w4m-83dg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34340?format=json","vulnerability_id":"VCID-6wtu-f43b-1ue9","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35559.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35559","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30647","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30687","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014518","reference_id":"2014518","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014518"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/","reference_id":"7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/"},{"reference_url":"https://security.archlinux.org/AVG-2477","reference_id":"AVG-2477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2477"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/","reference_id":"DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://www.debian.org/security/2021/dsa-5012","reference_id":"dsa-5012","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://www.debian.org/security/2021/dsa-5012"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4135","reference_id":"RHSA-2021:4135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4531","reference_id":"RHSA-2021:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4532","reference_id":"RHSA-2021:4532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5030","reference_id":"RHSA-2021:5030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0310","reference_id":"RHSA-2022:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0345","reference_id":"RHSA-2022:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0345"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/","reference_id":"V362B2BWTH5IJDL45QPQGMBKIQOG7JX5","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-25T16:02:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35559"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6wtu-f43b-1ue9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79763?format=json","vulnerability_id":"VCID-6ywn-1kuf-1ufb","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2754.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2754.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2754","reference_id":"","reference_type":"","scores":[{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52754","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.528","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52783","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823199","reference_id":"1823199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823199"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2754","reference_id":"CVE-2020-2754","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:12Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2754"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ywn-1kuf-1ufb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34348?format=json","vulnerability_id":"VCID-6zn4-b8k4-3bcn","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35586.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35586","reference_id":"","reference_type":"","scores":[{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37711","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37837","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37917","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015308","reference_id":"2015308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015308"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://security.archlinux.org/AVG-2477","reference_id":"AVG-2477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2477"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://www.debian.org/security/2021/dsa-5012","reference_id":"dsa-5012","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/"}],"url":"https://www.debian.org/security/2021/dsa-5012"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4135","reference_id":"RHSA-2021:4135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4531","reference_id":"RHSA-2021:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4532","reference_id":"RHSA-2021:4532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5030","reference_id":"RHSA-2021:5030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0310","reference_id":"RHSA-2022:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0345","reference_id":"RHSA-2022:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0345"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35586"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6zn4-b8k4-3bcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79380?format=json","vulnerability_id":"VCID-74uc-nfy5-fbfx","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2983.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2983","reference_id":"","reference_type":"","scores":[{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56923","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57018","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57069","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57038","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761262","reference_id":"1761262","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761262"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2983","reference_id":"CVE-2019-2983","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:51Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2983"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-74uc-nfy5-fbfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74699?format=json","vulnerability_id":"VCID-76rb-sg3r-bqce","summary":"OpenJDK: potential UTF8 size overflow (8314794)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21131","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63286","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63303","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63338","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63258","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63287","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297961","reference_id":"2297961","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297961"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240719-0008/","reference_id":"ntap-20240719-0008","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240719-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4560","reference_id":"RHSA-2024:4560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4561","reference_id":"RHSA-2024:4561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4562","reference_id":"RHSA-2024:4562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4563","reference_id":"RHSA-2024:4563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4564","reference_id":"RHSA-2024:4564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4565","reference_id":"RHSA-2024:4565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4566","reference_id":"RHSA-2024:4566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4567","reference_id":"RHSA-2024:4567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4568","reference_id":"RHSA-2024:4568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4569","reference_id":"RHSA-2024:4569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4570","reference_id":"RHSA-2024:4570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4571","reference_id":"RHSA-2024:4571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4572","reference_id":"RHSA-2024:4572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4573","reference_id":"RHSA-2024:4573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4573"},{"reference_url":"https://usn.ubuntu.com/6929-1/","reference_id":"USN-6929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6929-1/"},{"reference_url":"https://usn.ubuntu.com/6930-1/","reference_id":"USN-6930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6930-1/"},{"reference_url":"https://usn.ubuntu.com/6931-1/","reference_id":"USN-6931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6931-1/"},{"reference_url":"https://usn.ubuntu.com/6932-1/","reference_id":"USN-6932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6932-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21131"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76rb-sg3r-bqce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34420?format=json","vulnerability_id":"VCID-7913-mqsn-3bd8","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14796.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14796.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14796","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32743","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32803","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32805","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32767","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889697","reference_id":"1889697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889697"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0530","reference_id":"RHSA-2021:0530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0530"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14796"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7913-mqsn-3bd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34410?format=json","vulnerability_id":"VCID-7c1s-f99n-bfds","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14581.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14581","reference_id":"","reference_type":"","scores":[{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59722","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59738","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1857172","reference_id":"1857172","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1857172"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","reference_id":"6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","reference_id":"DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","reference_id":"MEPHBZPNSLX43B26DWKB7OS6AROTS2BO","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","reference_id":"QQUMIAON2YEFRONMIUVHAKYCIOLICDBA","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/"},{"reference_url":"https://usn.ubuntu.com/4433-1/","reference_id":"USN-4433-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://usn.ubuntu.com/4433-1/"},{"reference_url":"https://usn.ubuntu.com/4453-1/","reference_id":"USN-4453-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:50Z/"}],"url":"https://usn.ubuntu.com/4453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14581"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7c1s-f99n-bfds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31977?format=json","vulnerability_id":"VCID-8cup-qnc8-wudx","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20952","reference_id":"","reference_type":"","scores":[{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55466","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55441","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55444","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55483","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257837","reference_id":"2257837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257837"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html","reference_id":"msg00023.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0002/","reference_id":"ntap-20240201-0002","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0222","reference_id":"RHSA-2024:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0223","reference_id":"RHSA-2024:0223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0224","reference_id":"RHSA-2024:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0225","reference_id":"RHSA-2024:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0226","reference_id":"RHSA-2024:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0228","reference_id":"RHSA-2024:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0230","reference_id":"RHSA-2024:0230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0231","reference_id":"RHSA-2024:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0232","reference_id":"RHSA-2024:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0233","reference_id":"RHSA-2024:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0234","reference_id":"RHSA-2024:0234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0235","reference_id":"RHSA-2024:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0237","reference_id":"RHSA-2024:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0239","reference_id":"RHSA-2024:0239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0240","reference_id":"RHSA-2024:0240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0241","reference_id":"RHSA-2024:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0242","reference_id":"RHSA-2024:0242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0244","reference_id":"RHSA-2024:0244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0246","reference_id":"RHSA-2024:0246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0247","reference_id":"RHSA-2024:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0248","reference_id":"RHSA-2024:0248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0249","reference_id":"RHSA-2024:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0250","reference_id":"RHSA-2024:0250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0265","reference_id":"RHSA-2024:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0266","reference_id":"RHSA-2024:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0267","reference_id":"RHSA-2024:0267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1481","reference_id":"RHSA-2024:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1482","reference_id":"RHSA-2024:1482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1482"},{"reference_url":"https://usn.ubuntu.com/6660-1/","reference_id":"USN-6660-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6660-1/"},{"reference_url":"https://usn.ubuntu.com/6661-1/","reference_id":"USN-6661-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6661-1/"},{"reference_url":"https://usn.ubuntu.com/6662-1/","reference_id":"USN-6662-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6662-1/"},{"reference_url":"https://usn.ubuntu.com/6696-1/","reference_id":"USN-6696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6696-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-20952"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8cup-qnc8-wudx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45913?format=json","vulnerability_id":"VCID-8fmy-hu1v-nqct","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2756.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2756","reference_id":"","reference_type":"","scores":[{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49425","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49446","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49428","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823215","reference_id":"1823215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823215"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2756","reference_id":"CVE-2020-2756","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2756"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1507","reference_id":"RHSA-2020:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1508","reference_id":"RHSA-2020:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:07Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2756"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fmy-hu1v-nqct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78480?format=json","vulnerability_id":"VCID-8wud-7t2q-xfa3","summary":"OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21968.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21968.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21968","reference_id":"","reference_type":"","scores":[{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25134","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957","reference_id":"1035957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280","reference_id":"1036280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187802","reference_id":"2187802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1875","reference_id":"RHSA-2023:1875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1877","reference_id":"RHSA-2023:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1878","reference_id":"RHSA-2023:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1879","reference_id":"RHSA-2023:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1880","reference_id":"RHSA-2023:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1882","reference_id":"RHSA-2023:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1883","reference_id":"RHSA-2023:1883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1884","reference_id":"RHSA-2023:1884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1885","reference_id":"RHSA-2023:1885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1889","reference_id":"RHSA-2023:1889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1890","reference_id":"RHSA-2023:1890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1891","reference_id":"RHSA-2023:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1892","reference_id":"RHSA-2023:1892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1895","reference_id":"RHSA-2023:1895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1898","reference_id":"RHSA-2023:1898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1899","reference_id":"RHSA-2023:1899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1900","reference_id":"RHSA-2023:1900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1903","reference_id":"RHSA-2023:1903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1904","reference_id":"RHSA-2023:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1905","reference_id":"RHSA-2023:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1906","reference_id":"RHSA-2023:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1907","reference_id":"RHSA-2023:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1908","reference_id":"RHSA-2023:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1909","reference_id":"RHSA-2023:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1910","reference_id":"RHSA-2023:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1911","reference_id":"RHSA-2023:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1912","reference_id":"RHSA-2023:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4103","reference_id":"RHSA-2023:4103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4160","reference_id":"RHSA-2023:4160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4160"},{"reference_url":"https://usn.ubuntu.com/6077-1/","reference_id":"USN-6077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21968"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8wud-7t2q-xfa3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82356?format=json","vulnerability_id":"VCID-9189-kdj5-rqa6","summary":"OpenJDK: Non-constant time comparison in ChaCha20Cipher (Security, 8221344)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2818.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2818.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2818","reference_id":"","reference_type":"","scores":[{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77741","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77818","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77759","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77786","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730078","reference_id":"1730078","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730078"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"cpujul2019-5072835.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:49Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1810","reference_id":"RHSA-2019:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1817","reference_id":"RHSA-2019:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1817"},{"reference_url":"https://usn.ubuntu.com/4083-1/","reference_id":"USN-4083-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:49Z/"}],"url":"https://usn.ubuntu.com/4083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037802?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.4%2B11-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-1d6t-ndfc-m7hg"},{"vulnerability":"VCID-1nr6-3bq8-nbfn"},{"vulnerability":"VCID-1pdg-7bbt-kqfz"},{"vulnerability":"VCID-2ggq-ccut-5ycs"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-2wfy-nmqn-mkfe"},{"vulnerability":"VCID-347b-v3k9-b7cp"},{"vulnerability":"VCID-39gh-uwky-kke9"},{"vulnerability":"VCID-3aae-859j-1bg9"},{"vulnerability":"VCID-3b1m-995s-r7a8"},{"vulnerability":"VCID-3hj5-z3ck-tkha"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-3v2y-qzfu-nydb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-4thy-7844-xuc9"},{"vulnerability":"VCID-4trq-2j9e-bbfd"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-5wj6-ejpa-3kft"},{"vulnerability":"VCID-5xg6-kds9-g3hf"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-64zz-esk6-y3fy"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6ywn-1kuf-1ufb"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-74uc-nfy5-fbfx"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-7913-mqsn-3bd8"},{"vulnerability":"VCID-7c1s-f99n-bfds"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8fmy-hu1v-nqct"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-93n5-e3u3-kugs"},{"vulnerability":"VCID-95d9-a86j-tkdy"},{"vulnerability":"VCID-97bv-kegv-uyd9"},{"vulnerability":"VCID-98bc-5jrc-5kas"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a129-wbcc-yqec"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-a95g-84vs-xbav"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-cena-jspa-2ba7"},{"vulnerability":"VCID-chp9-6c8n-xufp"},{"vulnerability":"VCID-d6wf-827v-a7c3"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-ey12-2uq3-6bar"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-g2fj-4mgh-23fs"},{"vulnerability":"VCID-gfxx-m9ud-rybe"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-he8f-erpk-sqh8"},{"vulnerability":"VCID-hg8h-z7af-pqe3"},{"vulnerability":"VCID-hmzc-b2h5-ryh2"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-htq1-a17u-4bh3"},{"vulnerability":"VCID-hx4c-96gx-2fbq"},{"vulnerability":"VCID-jc9v-4116-4yas"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jr6p-7nkg-1fe9"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-k3xn-hbrs-nkab"},{"vulnerability":"VCID-kd25-3buc-cqdy"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-m3j8-8gff-6fg4"},{"vulnerability":"VCID-mh6k-v939-m7hj"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-mumk-x95v-bfc8"},{"vulnerability":"VCID-muvh-c3he-1bax"},{"vulnerability":"VCID-mwfy-hus1-37gt"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-ne6z-gg9f-qkcy"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nw7e-6j5f-ebfa"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p5ye-19wy-ayb8"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-psrh-rb6j-afh7"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rgbz-akft-f7e6"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-rmqx-pseh-q7a7"},{"vulnerability":"VCID-rpdj-d7je-47cs"},{"vulnerability":"VCID-s4d4-pvtj-8ucp"},{"vulnerability":"VCID-shg1-t3nh-67hk"},{"vulnerability":"VCID-spnj-gvva-efet"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-tekc-e66p-tyba"},{"vulnerability":"VCID-tkw1-8js4-h7cw"},{"vulnerability":"VCID-tna8-m3b1-nkhn"},{"vulnerability":"VCID-tpng-ppye-m7hv"},{"vulnerability":"VCID-tr4r-wm4s-auej"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-upb2-1jmf-3udy"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-vssb-tgq1-p3g8"},{"vulnerability":"VCID-wfjr-ddp6-mkd5"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-wrfc-9msj-hqbc"},{"vulnerability":"VCID-ws4h-edpn-nudd"},{"vulnerability":"VCID-wyfq-yjf2-c7dy"},{"vulnerability":"VCID-wz73-dwgr-3bf7"},{"vulnerability":"VCID-x3wp-bdkr-7fa8"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xfqx-d3jw-yuhn"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-xrec-qf6z-2ua9"},{"vulnerability":"VCID-y5qu-j3wt-wuej"},{"vulnerability":"VCID-y78f-qgn6-rua7"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-y8wp-rpgd-kfht"},{"vulnerability":"VCID-ycgg-4fpn-b3at"},{"vulnerability":"VCID-yqsu-y2mw-pqgt"},{"vulnerability":"VCID-yvf2-2a33-zqat"},{"vulnerability":"VCID-yxk8-59zb-y7g2"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zh9v-47ue-p7ep"},{"vulnerability":"VCID-zkz6-9t74-5bb4"},{"vulnerability":"VCID-zr4f-wpm3-f3an"},{"vulnerability":"VCID-ztx2-xh6v-nke1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.4%252B11-1"}],"aliases":["CVE-2019-2818"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9189-kdj5-rqa6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79381?format=json","vulnerability_id":"VCID-93n5-e3u3-kugs","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2987.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2987.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2987","reference_id":"","reference_type":"","scores":[{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.7225","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72212","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72232","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72245","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.7228","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72264","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761149","reference_id":"1761149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761149"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2987","reference_id":"CVE-2019-2987","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2987"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:45Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2987"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-93n5-e3u3-kugs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45945?format=json","vulnerability_id":"VCID-95d9-a86j-tkdy","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2773.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2773.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2773","reference_id":"","reference_type":"","scores":[{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73488","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73564","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73541","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823224","reference_id":"1823224","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823224"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2773","reference_id":"CVE-2020-2773","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2773"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1507","reference_id":"RHSA-2020:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1508","reference_id":"RHSA-2020:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0717","reference_id":"RHSA-2021:0717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0736","reference_id":"RHSA-2021:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0736"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:40Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2773"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-95d9-a86j-tkdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34346?format=json","vulnerability_id":"VCID-97bv-kegv-uyd9","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35567.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35567","reference_id":"","reference_type":"","scores":[{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44618","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44647","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015658","reference_id":"2015658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015658"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://security.archlinux.org/AVG-2477","reference_id":"AVG-2477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2477"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://www.debian.org/security/2021/dsa-5012","reference_id":"dsa-5012","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/"}],"url":"https://www.debian.org/security/2021/dsa-5012"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4135","reference_id":"RHSA-2021:4135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4531","reference_id":"RHSA-2021:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4532","reference_id":"RHSA-2021:4532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4532"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35567"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-97bv-kegv-uyd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34368?format=json","vulnerability_id":"VCID-98bc-5jrc-5kas","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21341","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29706","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29614","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041897","reference_id":"2041897","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041897"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21341"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-98bc-5jrc-5kas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31980?format=json","vulnerability_id":"VCID-9n5v-4daz-eyc2","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21217","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26611","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26658","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21217"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696","reference_id":"1085696","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318530","reference_id":"2318530","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318530"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10926","reference_id":"RHSA-2024:10926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8116","reference_id":"RHSA-2024:8116","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8117","reference_id":"RHSA-2024:8117","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8117"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8118","reference_id":"RHSA-2024:8118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8119","reference_id":"RHSA-2024:8119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8120","reference_id":"RHSA-2024:8120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8121","reference_id":"RHSA-2024:8121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8122","reference_id":"RHSA-2024:8122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8123","reference_id":"RHSA-2024:8123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8124","reference_id":"RHSA-2024:8124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8125","reference_id":"RHSA-2024:8125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8126","reference_id":"RHSA-2024:8126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8127","reference_id":"RHSA-2024:8127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8128","reference_id":"RHSA-2024:8128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8129","reference_id":"RHSA-2024:8129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8129"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"},{"reference_url":"https://usn.ubuntu.com/7099-1/","reference_id":"USN-7099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7099-1/"},{"reference_url":"https://usn.ubuntu.com/7124-1/","reference_id":"USN-7124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7124-1/"},{"reference_url":"https://usn.ubuntu.com/7338-1/","reference_id":"USN-7338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7338-1/"},{"reference_url":"https://usn.ubuntu.com/7339-1/","reference_id":"USN-7339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7339-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2024-21217"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5v-4daz-eyc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76841?format=json","vulnerability_id":"VCID-9urr-3gt2-mfhe","summary":"OpenJDK: long Exception message leading to crash (8319851)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21011","reference_id":"","reference_type":"","scores":[{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.567","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56721","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678","reference_id":"1069678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274977","reference_id":"2274977","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274977"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html","reference_id":"msg00014.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0004/","reference_id":"ntap-20240426-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:16:14Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1815","reference_id":"RHSA-2024:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1816","reference_id":"RHSA-2024:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1817","reference_id":"RHSA-2024:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1818","reference_id":"RHSA-2024:1818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1819","reference_id":"RHSA-2024:1819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1820","reference_id":"RHSA-2024:1820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1821","reference_id":"RHSA-2024:1821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1822","reference_id":"RHSA-2024:1822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1823","reference_id":"RHSA-2024:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1824","reference_id":"RHSA-2024:1824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1825","reference_id":"RHSA-2024:1825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1826","reference_id":"RHSA-2024:1826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1827","reference_id":"RHSA-2024:1827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1828","reference_id":"RHSA-2024:1828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1828"},{"reference_url":"https://usn.ubuntu.com/6810-1/","reference_id":"USN-6810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6810-1/"},{"reference_url":"https://usn.ubuntu.com/6811-1/","reference_id":"USN-6811-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6811-1/"},{"reference_url":"https://usn.ubuntu.com/6812-1/","reference_id":"USN-6812-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6812-1/"},{"reference_url":"https://usn.ubuntu.com/6813-1/","reference_id":"USN-6813-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6813-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21011"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9urr-3gt2-mfhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78477?format=json","vulnerability_id":"VCID-9uzg-sja9-hkcy","summary":"OpenJDK: Swing HTML parsing issue (8296832)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21939.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21939.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21939","reference_id":"","reference_type":"","scores":[{"value":"0.01861","scoring_system":"epss","scoring_elements":"0.83001","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01861","scoring_system":"epss","scoring_elements":"0.83048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01861","scoring_system":"epss","scoring_elements":"0.83014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01861","scoring_system":"epss","scoring_elements":"0.83012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01861","scoring_system":"epss","scoring_elements":"0.83037","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01861","scoring_system":"epss","scoring_elements":"0.83044","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01861","scoring_system":"epss","scoring_elements":"0.83059","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01861","scoring_system":"epss","scoring_elements":"0.83053","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957","reference_id":"1035957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280","reference_id":"1036280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187724","reference_id":"2187724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187724"},{"reference_url":"https://www.debian.org/security/2023/dsa-5430","reference_id":"dsa-5430","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/"}],"url":"https://www.debian.org/security/2023/dsa-5430"},{"reference_url":"https://www.debian.org/security/2023/dsa-5478","reference_id":"dsa-5478","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/"}],"url":"https://www.debian.org/security/2023/dsa-5478"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0008/","reference_id":"ntap-20230427-0008","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T19:26:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1875","reference_id":"RHSA-2023:1875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1877","reference_id":"RHSA-2023:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1878","reference_id":"RHSA-2023:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1879","reference_id":"RHSA-2023:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1880","reference_id":"RHSA-2023:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1882","reference_id":"RHSA-2023:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1883","reference_id":"RHSA-2023:1883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1884","reference_id":"RHSA-2023:1884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1885","reference_id":"RHSA-2023:1885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1889","reference_id":"RHSA-2023:1889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1890","reference_id":"RHSA-2023:1890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1891","reference_id":"RHSA-2023:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1892","reference_id":"RHSA-2023:1892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1895","reference_id":"RHSA-2023:1895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1898","reference_id":"RHSA-2023:1898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1899","reference_id":"RHSA-2023:1899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1900","reference_id":"RHSA-2023:1900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1903","reference_id":"RHSA-2023:1903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1904","reference_id":"RHSA-2023:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1905","reference_id":"RHSA-2023:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1906","reference_id":"RHSA-2023:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1907","reference_id":"RHSA-2023:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1908","reference_id":"RHSA-2023:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1909","reference_id":"RHSA-2023:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1910","reference_id":"RHSA-2023:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1911","reference_id":"RHSA-2023:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1912","reference_id":"RHSA-2023:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4103","reference_id":"RHSA-2023:4103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4160","reference_id":"RHSA-2023:4160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4160"},{"reference_url":"https://usn.ubuntu.com/6077-1/","reference_id":"USN-6077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21939"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9uzg-sja9-hkcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45898?format=json","vulnerability_id":"VCID-a129-wbcc-yqec","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2755.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2755","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43253","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43275","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43254","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823200","reference_id":"1823200","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823200"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2755","reference_id":"CVE-2020-2755","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2755"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:10Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2755"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a129-wbcc-yqec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31968?format=json","vulnerability_id":"VCID-a282-ksr4-j3cu","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22081","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26849","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26753","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26756","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26655","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243627","reference_id":"2243627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243627"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5725","reference_id":"RHSA-2023:5725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5726","reference_id":"RHSA-2023:5726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5727","reference_id":"RHSA-2023:5727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5728","reference_id":"RHSA-2023:5728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5729","reference_id":"RHSA-2023:5729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5730","reference_id":"RHSA-2023:5730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5731","reference_id":"RHSA-2023:5731","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5731"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5732","reference_id":"RHSA-2023:5732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5733","reference_id":"RHSA-2023:5733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5734","reference_id":"RHSA-2023:5734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5735","reference_id":"RHSA-2023:5735","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5735"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5736","reference_id":"RHSA-2023:5736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5737","reference_id":"RHSA-2023:5737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5739","reference_id":"RHSA-2023:5739","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5740","reference_id":"RHSA-2023:5740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5740"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5741","reference_id":"RHSA-2023:5741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5742","reference_id":"RHSA-2023:5742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5743","reference_id":"RHSA-2023:5743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5744","reference_id":"RHSA-2023:5744","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5745","reference_id":"RHSA-2023:5745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5746","reference_id":"RHSA-2023:5746","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5746"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5747","reference_id":"RHSA-2023:5747","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5747"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5750","reference_id":"RHSA-2023:5750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5751","reference_id":"RHSA-2023:5751","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5751"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5752","reference_id":"RHSA-2023:5752","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5752"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5753","reference_id":"RHSA-2023:5753","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5761","reference_id":"RHSA-2023:5761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5761"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6738","reference_id":"RHSA-2023:6738","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6738"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6887","reference_id":"RHSA-2023:6887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0866","reference_id":"RHSA-2024:0866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0879","reference_id":"RHSA-2024:0879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0879"},{"reference_url":"https://usn.ubuntu.com/6527-1/","reference_id":"USN-6527-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6527-1/"},{"reference_url":"https://usn.ubuntu.com/6528-1/","reference_id":"USN-6528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-22081"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a282-ksr4-j3cu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34431?format=json","vulnerability_id":"VCID-a3xk-3wya-s3gm","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21835","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23206","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23039","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23089","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160421","reference_id":"2160421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160421"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0190","reference_id":"RHSA-2023:0190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0191","reference_id":"RHSA-2023:0191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0192","reference_id":"RHSA-2023:0192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0193","reference_id":"RHSA-2023:0193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0194","reference_id":"RHSA-2023:0194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0195","reference_id":"RHSA-2023:0195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0196","reference_id":"RHSA-2023:0196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0197","reference_id":"RHSA-2023:0197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0198","reference_id":"RHSA-2023:0198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0199","reference_id":"RHSA-2023:0199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0200","reference_id":"RHSA-2023:0200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0201","reference_id":"RHSA-2023:0201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0202","reference_id":"RHSA-2023:0202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0352","reference_id":"RHSA-2023:0352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0353","reference_id":"RHSA-2023:0353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0388","reference_id":"RHSA-2023:0388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0389","reference_id":"RHSA-2023:0389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0389"},{"reference_url":"https://usn.ubuntu.com/5897-1/","reference_id":"USN-5897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21835"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a3xk-3wya-s3gm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31962?format=json","vulnerability_id":"VCID-a59u-h67v-yygm","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22041.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22041.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22041","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22289","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22073","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22208","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22188","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22128","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223207","reference_id":"2223207","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223207"},{"reference_url":"https://security.gentoo.org/glsa/202407-24","reference_id":"GLSA-202407-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-24"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4157","reference_id":"RHSA-2023:4157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4158","reference_id":"RHSA-2023:4158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4159","reference_id":"RHSA-2023:4159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4161","reference_id":"RHSA-2023:4161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4162","reference_id":"RHSA-2023:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4163","reference_id":"RHSA-2023:4163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4164","reference_id":"RHSA-2023:4164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4165","reference_id":"RHSA-2023:4165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4169","reference_id":"RHSA-2023:4169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4170","reference_id":"RHSA-2023:4170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4171","reference_id":"RHSA-2023:4171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4175","reference_id":"RHSA-2023:4175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4177","reference_id":"RHSA-2023:4177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4208","reference_id":"RHSA-2023:4208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4210","reference_id":"RHSA-2023:4210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4211","reference_id":"RHSA-2023:4211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4233","reference_id":"RHSA-2023:4233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4233"},{"reference_url":"https://usn.ubuntu.com/6263-1/","reference_id":"USN-6263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6263-1/"},{"reference_url":"https://usn.ubuntu.com/6272-1/","reference_id":"USN-6272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-22041"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a59u-h67v-yygm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79488?format=json","vulnerability_id":"VCID-a95g-84vs-xbav","summary":"OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21476","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40767","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40817","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010597","reference_id":"1010597","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010597"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075842","reference_id":"2075842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075842"},{"reference_url":"https://security.archlinux.org/AVG-2687","reference_id":"AVG-2687","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2687"},{"reference_url":"https://security.archlinux.org/AVG-2688","reference_id":"AVG-2688","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2688"},{"reference_url":"https://security.archlinux.org/AVG-2689","reference_id":"AVG-2689","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2689"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1435","reference_id":"RHSA-2022:1435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1436","reference_id":"RHSA-2022:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1437","reference_id":"RHSA-2022:1437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1438","reference_id":"RHSA-2022:1438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1439","reference_id":"RHSA-2022:1439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1440","reference_id":"RHSA-2022:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1441","reference_id":"RHSA-2022:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1442","reference_id":"RHSA-2022:1442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1443","reference_id":"RHSA-2022:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1444","reference_id":"RHSA-2022:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1445","reference_id":"RHSA-2022:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1487","reference_id":"RHSA-2022:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1488","reference_id":"RHSA-2022:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1489","reference_id":"RHSA-2022:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1490","reference_id":"RHSA-2022:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1491","reference_id":"RHSA-2022:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1492","reference_id":"RHSA-2022:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1728","reference_id":"RHSA-2022:1728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1729","reference_id":"RHSA-2022:1729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2137","reference_id":"RHSA-2022:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2137"},{"reference_url":"https://usn.ubuntu.com/5388-1/","reference_id":"USN-5388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-1/"},{"reference_url":"https://usn.ubuntu.com/5388-2/","reference_id":"USN-5388-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-2/"},{"reference_url":"https://usn.ubuntu.com/5546-1/","reference_id":"USN-5546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-1/"},{"reference_url":"https://usn.ubuntu.com/5546-2/","reference_id":"USN-5546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21476"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a95g-84vs-xbav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64944?format=json","vulnerability_id":"VCID-apsn-z1br-3bdy","summary":"openjdk: Enhance Certificate Checking (Oracle CPU 2026-01)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21945","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16786","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1693","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16714","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16799","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119","reference_id":"1126119","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429927","reference_id":"2429927","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429927"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:04:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0847","reference_id":"RHSA-2026:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0848","reference_id":"RHSA-2026:0848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0849","reference_id":"RHSA-2026:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0895","reference_id":"RHSA-2026:0895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0896","reference_id":"RHSA-2026:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0897","reference_id":"RHSA-2026:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0898","reference_id":"RHSA-2026:0898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0899","reference_id":"RHSA-2026:0899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0900","reference_id":"RHSA-2026:0900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0901","reference_id":"RHSA-2026:0901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0927","reference_id":"RHSA-2026:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0928","reference_id":"RHSA-2026:0928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0931","reference_id":"RHSA-2026:0931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0932","reference_id":"RHSA-2026:0932","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0932"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0933","reference_id":"RHSA-2026:0933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1606","reference_id":"RHSA-2026:1606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4832","reference_id":"RHSA-2026:4832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4832"},{"reference_url":"https://usn.ubuntu.com/7995-1/","reference_id":"USN-7995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7995-1/"},{"reference_url":"https://usn.ubuntu.com/7996-1/","reference_id":"USN-7996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7996-1/"},{"reference_url":"https://usn.ubuntu.com/7997-1/","reference_id":"USN-7997-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7997-1/"},{"reference_url":"https://usn.ubuntu.com/7998-1/","reference_id":"USN-7998-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7998-1/"},{"reference_url":"https://usn.ubuntu.com/8000-1/","reference_id":"USN-8000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8000-1/"},{"reference_url":"https://usn.ubuntu.com/8001-1/","reference_id":"USN-8001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8001-1/"},{"reference_url":"https://usn.ubuntu.com/8002-1/","reference_id":"USN-8002-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8002-1/"},{"reference_url":"https://usn.ubuntu.com/8003-1/","reference_id":"USN-8003-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8003-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2026-21945"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apsn-z1br-3bdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68623?format=json","vulnerability_id":"VCID-b32x-4pu4-jkh4","summary":"openjdk: Better Glyph drawing (Oracle CPU 2025-07)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30749","reference_id":"","reference_type":"","scores":[{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.6625","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66277","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71372","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71355","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71388","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376783","reference_id":"2376783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376783"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:23:21Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10861","reference_id":"RHSA-2025:10861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10862","reference_id":"RHSA-2025:10862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10863","reference_id":"RHSA-2025:10863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10864","reference_id":"RHSA-2025:10864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10865","reference_id":"RHSA-2025:10865","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10866","reference_id":"RHSA-2025:10866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10867","reference_id":"RHSA-2025:10867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10868","reference_id":"RHSA-2025:10868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10869","reference_id":"RHSA-2025:10869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10870","reference_id":"RHSA-2025:10870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10873","reference_id":"RHSA-2025:10873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10874","reference_id":"RHSA-2025:10874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10875","reference_id":"RHSA-2025:10875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13656","reference_id":"RHSA-2025:13656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13675","reference_id":"RHSA-2025:13675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0934","reference_id":"RHSA-2026:0934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"reference_url":"https://usn.ubuntu.com/7667-1/","reference_id":"USN-7667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7667-1/"},{"reference_url":"https://usn.ubuntu.com/7668-1/","reference_id":"USN-7668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7668-1/"},{"reference_url":"https://usn.ubuntu.com/7669-1/","reference_id":"USN-7669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7669-1/"},{"reference_url":"https://usn.ubuntu.com/7672-1/","reference_id":"USN-7672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7672-1/"},{"reference_url":"https://usn.ubuntu.com/7673-1/","reference_id":"USN-7673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7673-1/"},{"reference_url":"https://usn.ubuntu.com/7674-1/","reference_id":"USN-7674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7674-1/"},{"reference_url":"https://usn.ubuntu.com/7690-1/","reference_id":"USN-7690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7690-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-30749"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b32x-4pu4-jkh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79364?format=json","vulnerability_id":"VCID-b439-gxyj-6ydx","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2816.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2816","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44862","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.4484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.4476","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44874","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730099","reference_id":"1730099","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730099"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"cpujul2019-5072835.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300","reference_id":"index?page=content&id=SB10300","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1810","reference_id":"RHSA-2019:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1811","reference_id":"RHSA-2019:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1815","reference_id":"RHSA-2019:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1816","reference_id":"RHSA-2019:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1817","reference_id":"RHSA-2019:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1839","reference_id":"RHSA-2019:1839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1840","reference_id":"RHSA-2019:1840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2494","reference_id":"RHSA-2019:2494","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2495","reference_id":"RHSA-2019:2495","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2585","reference_id":"RHSA-2019:2585","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2590","reference_id":"RHSA-2019:2590","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2592","reference_id":"RHSA-2019:2592","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2737","reference_id":"RHSA-2019:2737","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2737"},{"reference_url":"https://usn.ubuntu.com/4080-1/","reference_id":"USN-4080-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://usn.ubuntu.com/4080-1/"},{"reference_url":"https://usn.ubuntu.com/4083-1/","reference_id":"USN-4083-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:52Z/"}],"url":"https://usn.ubuntu.com/4083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037802?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.4%2B11-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-1d6t-ndfc-m7hg"},{"vulnerability":"VCID-1nr6-3bq8-nbfn"},{"vulnerability":"VCID-1pdg-7bbt-kqfz"},{"vulnerability":"VCID-2ggq-ccut-5ycs"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-2wfy-nmqn-mkfe"},{"vulnerability":"VCID-347b-v3k9-b7cp"},{"vulnerability":"VCID-39gh-uwky-kke9"},{"vulnerability":"VCID-3aae-859j-1bg9"},{"vulnerability":"VCID-3b1m-995s-r7a8"},{"vulnerability":"VCID-3hj5-z3ck-tkha"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-3v2y-qzfu-nydb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-4thy-7844-xuc9"},{"vulnerability":"VCID-4trq-2j9e-bbfd"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-5wj6-ejpa-3kft"},{"vulnerability":"VCID-5xg6-kds9-g3hf"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-64zz-esk6-y3fy"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6ywn-1kuf-1ufb"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-74uc-nfy5-fbfx"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-7913-mqsn-3bd8"},{"vulnerability":"VCID-7c1s-f99n-bfds"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8fmy-hu1v-nqct"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-93n5-e3u3-kugs"},{"vulnerability":"VCID-95d9-a86j-tkdy"},{"vulnerability":"VCID-97bv-kegv-uyd9"},{"vulnerability":"VCID-98bc-5jrc-5kas"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a129-wbcc-yqec"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-a95g-84vs-xbav"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-cena-jspa-2ba7"},{"vulnerability":"VCID-chp9-6c8n-xufp"},{"vulnerability":"VCID-d6wf-827v-a7c3"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-ey12-2uq3-6bar"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-g2fj-4mgh-23fs"},{"vulnerability":"VCID-gfxx-m9ud-rybe"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-he8f-erpk-sqh8"},{"vulnerability":"VCID-hg8h-z7af-pqe3"},{"vulnerability":"VCID-hmzc-b2h5-ryh2"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-htq1-a17u-4bh3"},{"vulnerability":"VCID-hx4c-96gx-2fbq"},{"vulnerability":"VCID-jc9v-4116-4yas"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jr6p-7nkg-1fe9"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-k3xn-hbrs-nkab"},{"vulnerability":"VCID-kd25-3buc-cqdy"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-m3j8-8gff-6fg4"},{"vulnerability":"VCID-mh6k-v939-m7hj"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-mumk-x95v-bfc8"},{"vulnerability":"VCID-muvh-c3he-1bax"},{"vulnerability":"VCID-mwfy-hus1-37gt"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-ne6z-gg9f-qkcy"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nw7e-6j5f-ebfa"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p5ye-19wy-ayb8"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-psrh-rb6j-afh7"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rgbz-akft-f7e6"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-rmqx-pseh-q7a7"},{"vulnerability":"VCID-rpdj-d7je-47cs"},{"vulnerability":"VCID-s4d4-pvtj-8ucp"},{"vulnerability":"VCID-shg1-t3nh-67hk"},{"vulnerability":"VCID-spnj-gvva-efet"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-tekc-e66p-tyba"},{"vulnerability":"VCID-tkw1-8js4-h7cw"},{"vulnerability":"VCID-tna8-m3b1-nkhn"},{"vulnerability":"VCID-tpng-ppye-m7hv"},{"vulnerability":"VCID-tr4r-wm4s-auej"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-upb2-1jmf-3udy"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-vssb-tgq1-p3g8"},{"vulnerability":"VCID-wfjr-ddp6-mkd5"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-wrfc-9msj-hqbc"},{"vulnerability":"VCID-ws4h-edpn-nudd"},{"vulnerability":"VCID-wyfq-yjf2-c7dy"},{"vulnerability":"VCID-wz73-dwgr-3bf7"},{"vulnerability":"VCID-x3wp-bdkr-7fa8"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xfqx-d3jw-yuhn"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-xrec-qf6z-2ua9"},{"vulnerability":"VCID-y5qu-j3wt-wuej"},{"vulnerability":"VCID-y78f-qgn6-rua7"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-y8wp-rpgd-kfht"},{"vulnerability":"VCID-ycgg-4fpn-b3at"},{"vulnerability":"VCID-yqsu-y2mw-pqgt"},{"vulnerability":"VCID-yvf2-2a33-zqat"},{"vulnerability":"VCID-yxk8-59zb-y7g2"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zh9v-47ue-p7ep"},{"vulnerability":"VCID-zkz6-9t74-5bb4"},{"vulnerability":"VCID-zr4f-wpm3-f3an"},{"vulnerability":"VCID-ztx2-xh6v-nke1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.4%252B11-1"}],"aliases":["CVE-2019-2816"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b439-gxyj-6ydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81423?format=json","vulnerability_id":"VCID-cena-jspa-2ba7","summary":"OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2816.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2816","reference_id":"","reference_type":"","scores":[{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72139","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72144","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72179","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00708","scoring_system":"epss","scoring_elements":"0.72197","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823853","reference_id":"1823853","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823853"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2816","reference_id":"CVE-2020-2816","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:54:00Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2816"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cena-jspa-2ba7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79379?format=json","vulnerability_id":"VCID-chp9-6c8n-xufp","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2981.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2981.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2981","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.5616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.562","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.5619","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56133","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56154","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760980","reference_id":"1760980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760980"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2981","reference_id":"CVE-2019-2981","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2981"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:55Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2981"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chp9-6c8n-xufp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34422?format=json","vulnerability_id":"VCID-d6wf-827v-a7c3","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14798.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14798","reference_id":"","reference_type":"","scores":[{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47564","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47624","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47648","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891135","reference_id":"1891135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891135"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14798"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d6wf-827v-a7c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79362?format=json","vulnerability_id":"VCID-ddy6-hksc-5kde","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2769.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2769","reference_id":"","reference_type":"","scores":[{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68027","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68029","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67976","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68042","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68051","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68065","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730056","reference_id":"1730056","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730056"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"cpujul2019-5072835.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300","reference_id":"index?page=content&id=SB10300","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1810","reference_id":"RHSA-2019:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1811","reference_id":"RHSA-2019:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1815","reference_id":"RHSA-2019:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1816","reference_id":"RHSA-2019:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1817","reference_id":"RHSA-2019:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1839","reference_id":"RHSA-2019:1839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1840","reference_id":"RHSA-2019:1840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2494","reference_id":"RHSA-2019:2494","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2495","reference_id":"RHSA-2019:2495","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2585","reference_id":"RHSA-2019:2585","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2590","reference_id":"RHSA-2019:2590","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2592","reference_id":"RHSA-2019:2592","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2737","reference_id":"RHSA-2019:2737","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2737"},{"reference_url":"https://usn.ubuntu.com/4080-1/","reference_id":"USN-4080-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://usn.ubuntu.com/4080-1/"},{"reference_url":"https://usn.ubuntu.com/4083-1/","reference_id":"USN-4083-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:29:56Z/"}],"url":"https://usn.ubuntu.com/4083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037802?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.4%2B11-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-1d6t-ndfc-m7hg"},{"vulnerability":"VCID-1nr6-3bq8-nbfn"},{"vulnerability":"VCID-1pdg-7bbt-kqfz"},{"vulnerability":"VCID-2ggq-ccut-5ycs"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-2wfy-nmqn-mkfe"},{"vulnerability":"VCID-347b-v3k9-b7cp"},{"vulnerability":"VCID-39gh-uwky-kke9"},{"vulnerability":"VCID-3aae-859j-1bg9"},{"vulnerability":"VCID-3b1m-995s-r7a8"},{"vulnerability":"VCID-3hj5-z3ck-tkha"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-3v2y-qzfu-nydb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-4thy-7844-xuc9"},{"vulnerability":"VCID-4trq-2j9e-bbfd"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-5wj6-ejpa-3kft"},{"vulnerability":"VCID-5xg6-kds9-g3hf"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-64zz-esk6-y3fy"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6ywn-1kuf-1ufb"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-74uc-nfy5-fbfx"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-7913-mqsn-3bd8"},{"vulnerability":"VCID-7c1s-f99n-bfds"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8fmy-hu1v-nqct"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-93n5-e3u3-kugs"},{"vulnerability":"VCID-95d9-a86j-tkdy"},{"vulnerability":"VCID-97bv-kegv-uyd9"},{"vulnerability":"VCID-98bc-5jrc-5kas"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a129-wbcc-yqec"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-a95g-84vs-xbav"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-cena-jspa-2ba7"},{"vulnerability":"VCID-chp9-6c8n-xufp"},{"vulnerability":"VCID-d6wf-827v-a7c3"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-ey12-2uq3-6bar"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-g2fj-4mgh-23fs"},{"vulnerability":"VCID-gfxx-m9ud-rybe"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-he8f-erpk-sqh8"},{"vulnerability":"VCID-hg8h-z7af-pqe3"},{"vulnerability":"VCID-hmzc-b2h5-ryh2"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-htq1-a17u-4bh3"},{"vulnerability":"VCID-hx4c-96gx-2fbq"},{"vulnerability":"VCID-jc9v-4116-4yas"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jr6p-7nkg-1fe9"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-k3xn-hbrs-nkab"},{"vulnerability":"VCID-kd25-3buc-cqdy"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-m3j8-8gff-6fg4"},{"vulnerability":"VCID-mh6k-v939-m7hj"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-mumk-x95v-bfc8"},{"vulnerability":"VCID-muvh-c3he-1bax"},{"vulnerability":"VCID-mwfy-hus1-37gt"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-ne6z-gg9f-qkcy"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nw7e-6j5f-ebfa"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p5ye-19wy-ayb8"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-psrh-rb6j-afh7"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rgbz-akft-f7e6"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-rmqx-pseh-q7a7"},{"vulnerability":"VCID-rpdj-d7je-47cs"},{"vulnerability":"VCID-s4d4-pvtj-8ucp"},{"vulnerability":"VCID-shg1-t3nh-67hk"},{"vulnerability":"VCID-spnj-gvva-efet"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-tekc-e66p-tyba"},{"vulnerability":"VCID-tkw1-8js4-h7cw"},{"vulnerability":"VCID-tna8-m3b1-nkhn"},{"vulnerability":"VCID-tpng-ppye-m7hv"},{"vulnerability":"VCID-tr4r-wm4s-auej"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-upb2-1jmf-3udy"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-vssb-tgq1-p3g8"},{"vulnerability":"VCID-wfjr-ddp6-mkd5"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-wrfc-9msj-hqbc"},{"vulnerability":"VCID-ws4h-edpn-nudd"},{"vulnerability":"VCID-wyfq-yjf2-c7dy"},{"vulnerability":"VCID-wz73-dwgr-3bf7"},{"vulnerability":"VCID-x3wp-bdkr-7fa8"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xfqx-d3jw-yuhn"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-xrec-qf6z-2ua9"},{"vulnerability":"VCID-y5qu-j3wt-wuej"},{"vulnerability":"VCID-y78f-qgn6-rua7"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-y8wp-rpgd-kfht"},{"vulnerability":"VCID-ycgg-4fpn-b3at"},{"vulnerability":"VCID-yqsu-y2mw-pqgt"},{"vulnerability":"VCID-yvf2-2a33-zqat"},{"vulnerability":"VCID-yxk8-59zb-y7g2"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zh9v-47ue-p7ep"},{"vulnerability":"VCID-zkz6-9t74-5bb4"},{"vulnerability":"VCID-zr4f-wpm3-f3an"},{"vulnerability":"VCID-ztx2-xh6v-nke1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.4%252B11-1"}],"aliases":["CVE-2019-2769"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ddy6-hksc-5kde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64942?format=json","vulnerability_id":"VCID-duy9-6f1p-vqah","summary":"openjdk: Enhance Handling of URIs (Oracle CPU 2026-01)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21932.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21932","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09314","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09356","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09302","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119","reference_id":"1126119","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429925","reference_id":"2429925","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429925"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:55:36Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0849","reference_id":"RHSA-2026:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0896","reference_id":"RHSA-2026:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0898","reference_id":"RHSA-2026:0898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0900","reference_id":"RHSA-2026:0900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1606","reference_id":"RHSA-2026:1606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1606"},{"reference_url":"https://usn.ubuntu.com/7995-1/","reference_id":"USN-7995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7995-1/"},{"reference_url":"https://usn.ubuntu.com/7996-1/","reference_id":"USN-7996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7996-1/"},{"reference_url":"https://usn.ubuntu.com/7997-1/","reference_id":"USN-7997-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7997-1/"},{"reference_url":"https://usn.ubuntu.com/7998-1/","reference_id":"USN-7998-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7998-1/"},{"reference_url":"https://usn.ubuntu.com/8000-1/","reference_id":"USN-8000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8000-1/"},{"reference_url":"https://usn.ubuntu.com/8001-1/","reference_id":"USN-8001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8001-1/"},{"reference_url":"https://usn.ubuntu.com/8002-1/","reference_id":"USN-8002-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8002-1/"},{"reference_url":"https://usn.ubuntu.com/8003-1/","reference_id":"USN-8003-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8003-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2026-21932"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-duy9-6f1p-vqah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78479?format=json","vulnerability_id":"VCID-dwh6-xw5k-mqg8","summary":"OpenJDK: missing string checks for NULL characters (8296622)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21937.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21937.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21937","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25149","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24993","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25029","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25047","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957","reference_id":"1035957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280","reference_id":"1036280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187790","reference_id":"2187790","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187790"},{"reference_url":"https://www.debian.org/security/2023/dsa-5430","reference_id":"dsa-5430","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/"}],"url":"https://www.debian.org/security/2023/dsa-5430"},{"reference_url":"https://www.debian.org/security/2023/dsa-5478","reference_id":"dsa-5478","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/"}],"url":"https://www.debian.org/security/2023/dsa-5478"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0008/","reference_id":"ntap-20230427-0008","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:57Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1875","reference_id":"RHSA-2023:1875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1877","reference_id":"RHSA-2023:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1878","reference_id":"RHSA-2023:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1879","reference_id":"RHSA-2023:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1880","reference_id":"RHSA-2023:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1882","reference_id":"RHSA-2023:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1883","reference_id":"RHSA-2023:1883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1884","reference_id":"RHSA-2023:1884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1885","reference_id":"RHSA-2023:1885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1889","reference_id":"RHSA-2023:1889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1890","reference_id":"RHSA-2023:1890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1891","reference_id":"RHSA-2023:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1892","reference_id":"RHSA-2023:1892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1895","reference_id":"RHSA-2023:1895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1898","reference_id":"RHSA-2023:1898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1899","reference_id":"RHSA-2023:1899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1900","reference_id":"RHSA-2023:1900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1903","reference_id":"RHSA-2023:1903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1904","reference_id":"RHSA-2023:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1905","reference_id":"RHSA-2023:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1906","reference_id":"RHSA-2023:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1907","reference_id":"RHSA-2023:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1908","reference_id":"RHSA-2023:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1909","reference_id":"RHSA-2023:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1910","reference_id":"RHSA-2023:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1911","reference_id":"RHSA-2023:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1912","reference_id":"RHSA-2023:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4103","reference_id":"RHSA-2023:4103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4160","reference_id":"RHSA-2023:4160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4160"},{"reference_url":"https://usn.ubuntu.com/6077-1/","reference_id":"USN-6077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21937"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dwh6-xw5k-mqg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31965?format=json","vulnerability_id":"VCID-dyg2-udwy-cud7","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22045.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22045","reference_id":"","reference_type":"","scores":[{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36104","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3608","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42172","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221645","reference_id":"2221645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221645"},{"reference_url":"https://security.gentoo.org/glsa/202407-24","reference_id":"GLSA-202407-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-24"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4157","reference_id":"RHSA-2023:4157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4158","reference_id":"RHSA-2023:4158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4159","reference_id":"RHSA-2023:4159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4161","reference_id":"RHSA-2023:4161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4162","reference_id":"RHSA-2023:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4163","reference_id":"RHSA-2023:4163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4164","reference_id":"RHSA-2023:4164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4165","reference_id":"RHSA-2023:4165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4166","reference_id":"RHSA-2023:4166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4167","reference_id":"RHSA-2023:4167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4168","reference_id":"RHSA-2023:4168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4169","reference_id":"RHSA-2023:4169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4170","reference_id":"RHSA-2023:4170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4171","reference_id":"RHSA-2023:4171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4172","reference_id":"RHSA-2023:4172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4173","reference_id":"RHSA-2023:4173","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4173"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4174","reference_id":"RHSA-2023:4174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4175","reference_id":"RHSA-2023:4175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4176","reference_id":"RHSA-2023:4176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4177","reference_id":"RHSA-2023:4177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4178","reference_id":"RHSA-2023:4178","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4208","reference_id":"RHSA-2023:4208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4209","reference_id":"RHSA-2023:4209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4210","reference_id":"RHSA-2023:4210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4211","reference_id":"RHSA-2023:4211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4212","reference_id":"RHSA-2023:4212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4233","reference_id":"RHSA-2023:4233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4233"},{"reference_url":"https://usn.ubuntu.com/6263-1/","reference_id":"USN-6263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6263-1/"},{"reference_url":"https://usn.ubuntu.com/6272-1/","reference_id":"USN-6272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-22045"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dyg2-udwy-cud7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68625?format=json","vulnerability_id":"VCID-e6dm-6767-9kdk","summary":"openjdk: Improve HTTP client header handling (Oracle CPU 2025-07)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50059.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50059","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32311","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32212","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32631","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32603","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32669","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376785","reference_id":"2376785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376785"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:42:42Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10865","reference_id":"RHSA-2025:10865","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10866","reference_id":"RHSA-2025:10866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10867","reference_id":"RHSA-2025:10867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10868","reference_id":"RHSA-2025:10868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10869","reference_id":"RHSA-2025:10869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10870","reference_id":"RHSA-2025:10870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10873","reference_id":"RHSA-2025:10873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10874","reference_id":"RHSA-2025:10874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10875","reference_id":"RHSA-2025:10875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13656","reference_id":"RHSA-2025:13656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0934","reference_id":"RHSA-2026:0934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"reference_url":"https://usn.ubuntu.com/7668-1/","reference_id":"USN-7668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7668-1/"},{"reference_url":"https://usn.ubuntu.com/7669-1/","reference_id":"USN-7669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7669-1/"},{"reference_url":"https://usn.ubuntu.com/7672-1/","reference_id":"USN-7672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7672-1/"},{"reference_url":"https://usn.ubuntu.com/7673-1/","reference_id":"USN-7673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7673-1/"},{"reference_url":"https://usn.ubuntu.com/7674-1/","reference_id":"USN-7674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7674-1/"},{"reference_url":"https://usn.ubuntu.com/7690-1/","reference_id":"USN-7690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7690-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-50059"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6dm-6767-9kdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39548?format=json","vulnerability_id":"VCID-ey12-2uq3-6bar","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2654.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2654","reference_id":"","reference_type":"","scores":[{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56593","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5673","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791217","reference_id":"1791217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791217"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:46Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2654"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ey12-2uq3-6bar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31971?format=json","vulnerability_id":"VCID-fau4-ajny-nfbd","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20921.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20921","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40592","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40513","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257859","reference_id":"2257859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257859"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0222","reference_id":"RHSA-2024:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0223","reference_id":"RHSA-2024:0223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0224","reference_id":"RHSA-2024:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0225","reference_id":"RHSA-2024:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0226","reference_id":"RHSA-2024:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0228","reference_id":"RHSA-2024:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0230","reference_id":"RHSA-2024:0230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0231","reference_id":"RHSA-2024:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0232","reference_id":"RHSA-2024:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0233","reference_id":"RHSA-2024:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0234","reference_id":"RHSA-2024:0234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0235","reference_id":"RHSA-2024:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0237","reference_id":"RHSA-2024:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0239","reference_id":"RHSA-2024:0239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0240","reference_id":"RHSA-2024:0240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0241","reference_id":"RHSA-2024:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0242","reference_id":"RHSA-2024:0242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0244","reference_id":"RHSA-2024:0244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0246","reference_id":"RHSA-2024:0246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0247","reference_id":"RHSA-2024:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0248","reference_id":"RHSA-2024:0248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0249","reference_id":"RHSA-2024:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0250","reference_id":"RHSA-2024:0250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0265","reference_id":"RHSA-2024:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0266","reference_id":"RHSA-2024:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0267","reference_id":"RHSA-2024:0267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1481","reference_id":"RHSA-2024:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1482","reference_id":"RHSA-2024:1482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1482"},{"reference_url":"https://usn.ubuntu.com/6660-1/","reference_id":"USN-6660-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6660-1/"},{"reference_url":"https://usn.ubuntu.com/6661-1/","reference_id":"USN-6661-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6661-1/"},{"reference_url":"https://usn.ubuntu.com/6662-1/","reference_id":"USN-6662-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6662-1/"},{"reference_url":"https://usn.ubuntu.com/6696-1/","reference_id":"USN-6696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6696-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-20921"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fau4-ajny-nfbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78475?format=json","vulnerability_id":"VCID-fhj9-p1gx-c7hp","summary":"OpenJDK: incorrect enqueue of references in garbage collector (8298191)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21954.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21954","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15161","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15232","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957","reference_id":"1035957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280","reference_id":"1036280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187441","reference_id":"2187441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187441"},{"reference_url":"https://www.debian.org/security/2023/dsa-5430","reference_id":"dsa-5430","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5430"},{"reference_url":"https://www.debian.org/security/2023/dsa-5478","reference_id":"dsa-5478","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/"}],"url":"https://www.debian.org/security/2023/dsa-5478"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0008/","reference_id":"ntap-20230427-0008","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1875","reference_id":"RHSA-2023:1875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1877","reference_id":"RHSA-2023:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1878","reference_id":"RHSA-2023:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1879","reference_id":"RHSA-2023:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1880","reference_id":"RHSA-2023:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1882","reference_id":"RHSA-2023:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1883","reference_id":"RHSA-2023:1883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1884","reference_id":"RHSA-2023:1884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1885","reference_id":"RHSA-2023:1885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1889","reference_id":"RHSA-2023:1889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1890","reference_id":"RHSA-2023:1890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1891","reference_id":"RHSA-2023:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1892","reference_id":"RHSA-2023:1892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1895","reference_id":"RHSA-2023:1895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1898","reference_id":"RHSA-2023:1898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1899","reference_id":"RHSA-2023:1899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1900","reference_id":"RHSA-2023:1900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1903","reference_id":"RHSA-2023:1903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1904","reference_id":"RHSA-2023:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1905","reference_id":"RHSA-2023:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1906","reference_id":"RHSA-2023:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1907","reference_id":"RHSA-2023:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1908","reference_id":"RHSA-2023:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1909","reference_id":"RHSA-2023:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1910","reference_id":"RHSA-2023:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1911","reference_id":"RHSA-2023:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1912","reference_id":"RHSA-2023:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1912"},{"reference_url":"https://usn.ubuntu.com/6077-1/","reference_id":"USN-6077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21954"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fhj9-p1gx-c7hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31974?format=json","vulnerability_id":"VCID-fwk5-wqvn-4qaz","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20926.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20926","reference_id":"","reference_type":"","scores":[{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43651","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.4369","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43625","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.4368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43668","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257850","reference_id":"2257850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257850"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html","reference_id":"msg00023.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0002/","reference_id":"ntap-20240201-0002","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T16:03:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0222","reference_id":"RHSA-2024:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0223","reference_id":"RHSA-2024:0223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0224","reference_id":"RHSA-2024:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0225","reference_id":"RHSA-2024:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0226","reference_id":"RHSA-2024:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0228","reference_id":"RHSA-2024:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0230","reference_id":"RHSA-2024:0230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0231","reference_id":"RHSA-2024:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0232","reference_id":"RHSA-2024:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0233","reference_id":"RHSA-2024:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0234","reference_id":"RHSA-2024:0234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0235","reference_id":"RHSA-2024:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0237","reference_id":"RHSA-2024:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0239","reference_id":"RHSA-2024:0239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0265","reference_id":"RHSA-2024:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0266","reference_id":"RHSA-2024:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1481","reference_id":"RHSA-2024:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1482","reference_id":"RHSA-2024:1482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1482"},{"reference_url":"https://usn.ubuntu.com/6660-1/","reference_id":"USN-6660-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6660-1/"},{"reference_url":"https://usn.ubuntu.com/6696-1/","reference_id":"USN-6696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6696-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-20926"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwk5-wqvn-4qaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34425?format=json","vulnerability_id":"VCID-fwv1-sj5y-xygd","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21619","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49517","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49544","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49551","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49546","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49535","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49537","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133745","reference_id":"2133745","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133745"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6999","reference_id":"RHSA-2022:6999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7000","reference_id":"RHSA-2022:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7001","reference_id":"RHSA-2022:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7002","reference_id":"RHSA-2022:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7003","reference_id":"RHSA-2022:7003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7004","reference_id":"RHSA-2022:7004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7005","reference_id":"RHSA-2022:7005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7006","reference_id":"RHSA-2022:7006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7007","reference_id":"RHSA-2022:7007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7008","reference_id":"RHSA-2022:7008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7009","reference_id":"RHSA-2022:7009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7010","reference_id":"RHSA-2022:7010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7011","reference_id":"RHSA-2022:7011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7012","reference_id":"RHSA-2022:7012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7013","reference_id":"RHSA-2022:7013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7049","reference_id":"RHSA-2022:7049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7050","reference_id":"RHSA-2022:7050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7051","reference_id":"RHSA-2022:7051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7052","reference_id":"RHSA-2022:7052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7053","reference_id":"RHSA-2022:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7054","reference_id":"RHSA-2022:7054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8880","reference_id":"RHSA-2022:8880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0128","reference_id":"RHSA-2023:0128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0128"},{"reference_url":"https://usn.ubuntu.com/5719-1/","reference_id":"USN-5719-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5719-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2022-21619"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwv1-sj5y-xygd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34356?format=json","vulnerability_id":"VCID-g2fj-4mgh-23fs","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21283","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30847","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32868","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32803","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32838","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041400","reference_id":"2041400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041400"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21283"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g2fj-4mgh-23fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34404?format=json","vulnerability_id":"VCID-gfxx-m9ud-rybe","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14562.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14562.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14562","reference_id":"","reference_type":"","scores":[{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55613","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5567","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55659","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856810","reference_id":"1856810","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856810"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202008-24","reference_id":"GLSA-202008-24","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"https://security.gentoo.org/glsa/202008-24"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","reference_id":"MEPHBZPNSLX43B26DWKB7OS6AROTS2BO","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","reference_id":"QQUMIAON2YEFRONMIUVHAKYCIOLICDBA","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2969","reference_id":"RHSA-2020:2969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2970","reference_id":"RHSA-2020:2970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3098","reference_id":"RHSA-2020:3098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3099","reference_id":"RHSA-2020:3099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3099"},{"reference_url":"https://usn.ubuntu.com/4433-1/","reference_id":"USN-4433-1","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:28Z/"}],"url":"https://usn.ubuntu.com/4433-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14562"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gfxx-m9ud-rybe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31966?format=json","vulnerability_id":"VCID-gjgy-dfq7-zfb2","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22049","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20223","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20303","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24903","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221647","reference_id":"2221647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221647"},{"reference_url":"https://security.gentoo.org/glsa/202407-24","reference_id":"GLSA-202407-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-24"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4157","reference_id":"RHSA-2023:4157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4158","reference_id":"RHSA-2023:4158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4159","reference_id":"RHSA-2023:4159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4161","reference_id":"RHSA-2023:4161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4162","reference_id":"RHSA-2023:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4163","reference_id":"RHSA-2023:4163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4164","reference_id":"RHSA-2023:4164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4165","reference_id":"RHSA-2023:4165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4166","reference_id":"RHSA-2023:4166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4167","reference_id":"RHSA-2023:4167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4168","reference_id":"RHSA-2023:4168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4169","reference_id":"RHSA-2023:4169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4170","reference_id":"RHSA-2023:4170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4171","reference_id":"RHSA-2023:4171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4172","reference_id":"RHSA-2023:4172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4173","reference_id":"RHSA-2023:4173","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4173"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4174","reference_id":"RHSA-2023:4174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4175","reference_id":"RHSA-2023:4175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4176","reference_id":"RHSA-2023:4176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4177","reference_id":"RHSA-2023:4177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4178","reference_id":"RHSA-2023:4178","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4208","reference_id":"RHSA-2023:4208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4209","reference_id":"RHSA-2023:4209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4210","reference_id":"RHSA-2023:4210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4211","reference_id":"RHSA-2023:4211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4212","reference_id":"RHSA-2023:4212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4212"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4233","reference_id":"RHSA-2023:4233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4876","reference_id":"RHSA-2023:4876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4877","reference_id":"RHSA-2023:4877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4877"},{"reference_url":"https://usn.ubuntu.com/6263-1/","reference_id":"USN-6263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6263-1/"},{"reference_url":"https://usn.ubuntu.com/6272-1/","reference_id":"USN-6272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-22049"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gjgy-dfq7-zfb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34339?format=json","vulnerability_id":"VCID-gksn-mb6g-rue5","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35556","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33383","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33437","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33433","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014515","reference_id":"2014515","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014515"},{"reference_url":"https://security.archlinux.org/AVG-2477","reference_id":"AVG-2477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2477"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4135","reference_id":"RHSA-2021:4135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4531","reference_id":"RHSA-2021:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4532","reference_id":"RHSA-2021:4532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5030","reference_id":"RHSA-2021:5030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0310","reference_id":"RHSA-2022:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0345","reference_id":"RHSA-2022:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0345"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35556"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gksn-mb6g-rue5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34426?format=json","vulnerability_id":"VCID-h2w2-8e43-j3g6","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21624","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42206","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42175","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42226","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133765","reference_id":"2133765","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133765"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6999","reference_id":"RHSA-2022:6999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7000","reference_id":"RHSA-2022:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7001","reference_id":"RHSA-2022:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7002","reference_id":"RHSA-2022:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7003","reference_id":"RHSA-2022:7003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7004","reference_id":"RHSA-2022:7004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7005","reference_id":"RHSA-2022:7005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7006","reference_id":"RHSA-2022:7006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7007","reference_id":"RHSA-2022:7007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7008","reference_id":"RHSA-2022:7008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7009","reference_id":"RHSA-2022:7009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7010","reference_id":"RHSA-2022:7010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7011","reference_id":"RHSA-2022:7011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7012","reference_id":"RHSA-2022:7012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7013","reference_id":"RHSA-2022:7013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7049","reference_id":"RHSA-2022:7049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7050","reference_id":"RHSA-2022:7050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7051","reference_id":"RHSA-2022:7051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7052","reference_id":"RHSA-2022:7052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7053","reference_id":"RHSA-2022:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7054","reference_id":"RHSA-2022:7054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8880","reference_id":"RHSA-2022:8880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0128","reference_id":"RHSA-2023:0128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0128"},{"reference_url":"https://usn.ubuntu.com/5719-1/","reference_id":"USN-5719-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5719-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2022-21624"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h2w2-8e43-j3g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76840?format=json","vulnerability_id":"VCID-h7n1-qfs3-v3fw","summary":"OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21012","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35055","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35007","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35004","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274975","reference_id":"2274975","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274975"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html","reference_id":"msg00014.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0004/","reference_id":"ntap-20240426-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:15:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1819","reference_id":"RHSA-2024:1819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1820","reference_id":"RHSA-2024:1820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1821","reference_id":"RHSA-2024:1821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1822","reference_id":"RHSA-2024:1822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1823","reference_id":"RHSA-2024:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1824","reference_id":"RHSA-2024:1824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1825","reference_id":"RHSA-2024:1825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1826","reference_id":"RHSA-2024:1826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1827","reference_id":"RHSA-2024:1827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1828","reference_id":"RHSA-2024:1828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1828"},{"reference_url":"https://usn.ubuntu.com/6811-1/","reference_id":"USN-6811-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6811-1/"},{"reference_url":"https://usn.ubuntu.com/6812-1/","reference_id":"USN-6812-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6812-1/"},{"reference_url":"https://usn.ubuntu.com/6813-1/","reference_id":"USN-6813-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6813-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21012"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h7n1-qfs3-v3fw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34343?format=json","vulnerability_id":"VCID-hdz7-kcy9-juah","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35564.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35564","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28817","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28773","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28948","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28822","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015061","reference_id":"2015061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015061"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/","reference_id":"7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/"},{"reference_url":"https://security.archlinux.org/AVG-2477","reference_id":"AVG-2477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2477"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/","reference_id":"DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://www.debian.org/security/2021/dsa-5012","reference_id":"dsa-5012","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://www.debian.org/security/2021/dsa-5012"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4135","reference_id":"RHSA-2021:4135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4531","reference_id":"RHSA-2021:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4532","reference_id":"RHSA-2021:4532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5030","reference_id":"RHSA-2021:5030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0310","reference_id":"RHSA-2022:0310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0345","reference_id":"RHSA-2022:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0345"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/","reference_id":"V362B2BWTH5IJDL45QPQGMBKIQOG7JX5","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-19T18:55:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35564"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz7-kcy9-juah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34342?format=json","vulnerability_id":"VCID-he8f-erpk-sqh8","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35561.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35561","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38981","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39189","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39163","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39192","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014524","reference_id":"2014524","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2014524"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/","reference_id":"7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/"},{"reference_url":"https://security.archlinux.org/AVG-2477","reference_id":"AVG-2477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2477"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/","reference_id":"DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://www.debian.org/security/2021/dsa-5012","reference_id":"dsa-5012","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://www.debian.org/security/2021/dsa-5012"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4135","reference_id":"RHSA-2021:4135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4531","reference_id":"RHSA-2021:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4532","reference_id":"RHSA-2021:4532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4957","reference_id":"RHSA-2022:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4959","reference_id":"RHSA-2022:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5837","reference_id":"RHSA-2022:5837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5837"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/","reference_id":"V362B2BWTH5IJDL45QPQGMBKIQOG7JX5","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35561"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-he8f-erpk-sqh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79385?format=json","vulnerability_id":"VCID-hg8h-z7af-pqe3","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2999.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2999","reference_id":"","reference_type":"","scores":[{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79785","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79734","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79778","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01308","scoring_system":"epss","scoring_elements":"0.79784","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760992","reference_id":"1760992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760992"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2999","reference_id":"CVE-2019-2999","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"},{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:29Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2999"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hg8h-z7af-pqe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45962?format=json","vulnerability_id":"VCID-hmzc-b2h5-ryh2","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2800.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2800","reference_id":"","reference_type":"","scores":[{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68797","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68728","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68816","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823527","reference_id":"1823527","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823527"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2800","reference_id":"CVE-2020-2800","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2800"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1507","reference_id":"RHSA-2020:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1508","reference_id":"RHSA-2020:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:16Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2800"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hmzc-b2h5-ryh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76842?format=json","vulnerability_id":"VCID-htat-fksw-c3gk","summary":"OpenJDK: Pack200 excessive memory allocation (8322114)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21085.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21085","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29207","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29213","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678","reference_id":"1069678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275001","reference_id":"2275001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275001"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html","reference_id":"msg00014.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0004/","reference_id":"ntap-20240426-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:35:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1815","reference_id":"RHSA-2024:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1816","reference_id":"RHSA-2024:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1817","reference_id":"RHSA-2024:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1818","reference_id":"RHSA-2024:1818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1819","reference_id":"RHSA-2024:1819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1820","reference_id":"RHSA-2024:1820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1821","reference_id":"RHSA-2024:1821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1822","reference_id":"RHSA-2024:1822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1822"},{"reference_url":"https://usn.ubuntu.com/6810-1/","reference_id":"USN-6810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6810-1/"},{"reference_url":"https://usn.ubuntu.com/6811-1/","reference_id":"USN-6811-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6811-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21085"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-htat-fksw-c3gk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45972?format=json","vulnerability_id":"VCID-htq1-a17u-4bh3","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2803.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2803","reference_id":"","reference_type":"","scores":[{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.8712","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87092","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03262","scoring_system":"epss","scoring_elements":"0.87141","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823694","reference_id":"1823694","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823694"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2803","reference_id":"CVE-2020-2803","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2803"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1507","reference_id":"RHSA-2020:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1508","reference_id":"RHSA-2020:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:31Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2803"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-htq1-a17u-4bh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79484?format=json","vulnerability_id":"VCID-hx4c-96gx-2fbq","summary":"OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21426","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19268","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19326","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19374","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1924","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075788","reference_id":"2075788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075788"},{"reference_url":"https://security.archlinux.org/AVG-2686","reference_id":"AVG-2686","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2686"},{"reference_url":"https://security.archlinux.org/AVG-2687","reference_id":"AVG-2687","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2687"},{"reference_url":"https://security.archlinux.org/AVG-2688","reference_id":"AVG-2688","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2688"},{"reference_url":"https://security.archlinux.org/AVG-2689","reference_id":"AVG-2689","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2689"},{"reference_url":"https://www.debian.org/security/2022/dsa-5128","reference_id":"dsa-5128","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/"}],"url":"https://www.debian.org/security/2022/dsa-5128"},{"reference_url":"https://www.debian.org/security/2022/dsa-5131","reference_id":"dsa-5131","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/"}],"url":"https://www.debian.org/security/2022/dsa-5131"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0006/","reference_id":"ntap-20220429-0006","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:35:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1435","reference_id":"RHSA-2022:1435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1436","reference_id":"RHSA-2022:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1437","reference_id":"RHSA-2022:1437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1438","reference_id":"RHSA-2022:1438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1439","reference_id":"RHSA-2022:1439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1440","reference_id":"RHSA-2022:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1441","reference_id":"RHSA-2022:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1442","reference_id":"RHSA-2022:1442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1443","reference_id":"RHSA-2022:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1444","reference_id":"RHSA-2022:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1445","reference_id":"RHSA-2022:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1487","reference_id":"RHSA-2022:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1488","reference_id":"RHSA-2022:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1489","reference_id":"RHSA-2022:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1490","reference_id":"RHSA-2022:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1491","reference_id":"RHSA-2022:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1492","reference_id":"RHSA-2022:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1728","reference_id":"RHSA-2022:1728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1729","reference_id":"RHSA-2022:1729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2137","reference_id":"RHSA-2022:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3136","reference_id":"RHSA-2023:3136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3136"},{"reference_url":"https://usn.ubuntu.com/5388-1/","reference_id":"USN-5388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-1/"},{"reference_url":"https://usn.ubuntu.com/5388-2/","reference_id":"USN-5388-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-2/"},{"reference_url":"https://usn.ubuntu.com/5546-1/","reference_id":"USN-5546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-1/"},{"reference_url":"https://usn.ubuntu.com/5546-2/","reference_id":"USN-5546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21426"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hx4c-96gx-2fbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34417?format=json","vulnerability_id":"VCID-jc9v-4116-4yas","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14781.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14781","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28067","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889274","reference_id":"1889274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889274"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0717","reference_id":"RHSA-2021:0717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0736","reference_id":"RHSA-2021:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0736"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14781"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jc9v-4116-4yas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34429?format=json","vulnerability_id":"VCID-jm9f-9y4b-qye7","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39399.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39399","reference_id":"","reference_type":"","scores":[{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52061","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52077","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52113","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52098","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133776","reference_id":"2133776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133776"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6999","reference_id":"RHSA-2022:6999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7000","reference_id":"RHSA-2022:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7001","reference_id":"RHSA-2022:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7008","reference_id":"RHSA-2022:7008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7009","reference_id":"RHSA-2022:7009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7010","reference_id":"RHSA-2022:7010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7011","reference_id":"RHSA-2022:7011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7012","reference_id":"RHSA-2022:7012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7013","reference_id":"RHSA-2022:7013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7051","reference_id":"RHSA-2022:7051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7052","reference_id":"RHSA-2022:7052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7053","reference_id":"RHSA-2022:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7054","reference_id":"RHSA-2022:7054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7054"},{"reference_url":"https://usn.ubuntu.com/5719-1/","reference_id":"USN-5719-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5719-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2022-39399"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jm9f-9y4b-qye7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79374?format=json","vulnerability_id":"VCID-jr6p-7nkg-1fe9","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2962.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2962","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64884","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64771","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64849","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64857","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761266","reference_id":"1761266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761266"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2962","reference_id":"CVE-2019-2962","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:20Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2962"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jr6p-7nkg-1fe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31960?format=json","vulnerability_id":"VCID-jw6x-cntu-nfht","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22036.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22036.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22036","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.27022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26932","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26888","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26831","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221634","reference_id":"2221634","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221634"},{"reference_url":"https://security.gentoo.org/glsa/202407-24","reference_id":"GLSA-202407-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-24"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4157","reference_id":"RHSA-2023:4157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4158","reference_id":"RHSA-2023:4158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4159","reference_id":"RHSA-2023:4159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4161","reference_id":"RHSA-2023:4161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4162","reference_id":"RHSA-2023:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4163","reference_id":"RHSA-2023:4163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4164","reference_id":"RHSA-2023:4164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4165","reference_id":"RHSA-2023:4165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4169","reference_id":"RHSA-2023:4169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4170","reference_id":"RHSA-2023:4170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4171","reference_id":"RHSA-2023:4171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4175","reference_id":"RHSA-2023:4175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4177","reference_id":"RHSA-2023:4177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4208","reference_id":"RHSA-2023:4208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4210","reference_id":"RHSA-2023:4210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4211","reference_id":"RHSA-2023:4211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4233","reference_id":"RHSA-2023:4233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4233"},{"reference_url":"https://usn.ubuntu.com/6263-1/","reference_id":"USN-6263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6263-1/"},{"reference_url":"https://usn.ubuntu.com/6272-1/","reference_id":"USN-6272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-22036"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jw6x-cntu-nfht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31976?format=json","vulnerability_id":"VCID-jztz-7cuw-t7ep","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20945","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1213","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12211","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257874","reference_id":"2257874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257874"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0222","reference_id":"RHSA-2024:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0223","reference_id":"RHSA-2024:0223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0224","reference_id":"RHSA-2024:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0225","reference_id":"RHSA-2024:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0226","reference_id":"RHSA-2024:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0228","reference_id":"RHSA-2024:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0230","reference_id":"RHSA-2024:0230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0231","reference_id":"RHSA-2024:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0232","reference_id":"RHSA-2024:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0233","reference_id":"RHSA-2024:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0234","reference_id":"RHSA-2024:0234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0235","reference_id":"RHSA-2024:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0237","reference_id":"RHSA-2024:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0239","reference_id":"RHSA-2024:0239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0240","reference_id":"RHSA-2024:0240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0241","reference_id":"RHSA-2024:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0242","reference_id":"RHSA-2024:0242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0244","reference_id":"RHSA-2024:0244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0246","reference_id":"RHSA-2024:0246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0247","reference_id":"RHSA-2024:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0248","reference_id":"RHSA-2024:0248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0249","reference_id":"RHSA-2024:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0250","reference_id":"RHSA-2024:0250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0265","reference_id":"RHSA-2024:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0266","reference_id":"RHSA-2024:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0267","reference_id":"RHSA-2024:0267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1481","reference_id":"RHSA-2024:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1482","reference_id":"RHSA-2024:1482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1482"},{"reference_url":"https://usn.ubuntu.com/6660-1/","reference_id":"USN-6660-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6660-1/"},{"reference_url":"https://usn.ubuntu.com/6661-1/","reference_id":"USN-6661-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6661-1/"},{"reference_url":"https://usn.ubuntu.com/6662-1/","reference_id":"USN-6662-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6662-1/"},{"reference_url":"https://usn.ubuntu.com/6696-1/","reference_id":"USN-6696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6696-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-20945"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jztz-7cuw-t7ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34411?format=json","vulnerability_id":"VCID-k3xn-hbrs-nkab","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14583.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14583","reference_id":"","reference_type":"","scores":[{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77197","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77164","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77182","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77146","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77233","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856448","reference_id":"1856448","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856448"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","reference_id":"6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","reference_id":"DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202008-24","reference_id":"GLSA-202008-24","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://security.gentoo.org/glsa/202008-24"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","reference_id":"MEPHBZPNSLX43B26DWKB7OS6AROTS2BO","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","reference_id":"QQUMIAON2YEFRONMIUVHAKYCIOLICDBA","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2968","reference_id":"RHSA-2020:2968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2969","reference_id":"RHSA-2020:2969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2970","reference_id":"RHSA-2020:2970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2972","reference_id":"RHSA-2020:2972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2985","reference_id":"RHSA-2020:2985","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3098","reference_id":"RHSA-2020:3098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3099","reference_id":"RHSA-2020:3099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3100","reference_id":"RHSA-2020:3100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3101","reference_id":"RHSA-2020:3101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4433-1/","reference_id":"USN-4433-1","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://usn.ubuntu.com/4433-1/"},{"reference_url":"https://usn.ubuntu.com/4453-1/","reference_id":"USN-4453-1","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:01Z/"}],"url":"https://usn.ubuntu.com/4453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14583"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3xn-hbrs-nkab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79378?format=json","vulnerability_id":"VCID-kd25-3buc-cqdy","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2978.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2978.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2978","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64836","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64907","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64786","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64826","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6487","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761006","reference_id":"1761006","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761006"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2978","reference_id":"CVE-2019-2978","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2978"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:59Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2978"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kd25-3buc-cqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78474?format=json","vulnerability_id":"VCID-kq78-adbv-67a7","summary":"OpenJDK: improper connection handling during TLS handshake (8294474)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21930.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21930","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36214","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36276","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36239","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36908","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36774","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957","reference_id":"1035957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280","reference_id":"1036280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187435","reference_id":"2187435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187435"},{"reference_url":"https://www.debian.org/security/2023/dsa-5430","reference_id":"dsa-5430","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5430"},{"reference_url":"https://www.debian.org/security/2023/dsa-5478","reference_id":"dsa-5478","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5478"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0008/","reference_id":"ntap-20230427-0008","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-22T19:44:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1875","reference_id":"RHSA-2023:1875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1877","reference_id":"RHSA-2023:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1878","reference_id":"RHSA-2023:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1879","reference_id":"RHSA-2023:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1880","reference_id":"RHSA-2023:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1882","reference_id":"RHSA-2023:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1883","reference_id":"RHSA-2023:1883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1884","reference_id":"RHSA-2023:1884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1885","reference_id":"RHSA-2023:1885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1889","reference_id":"RHSA-2023:1889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1890","reference_id":"RHSA-2023:1890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1891","reference_id":"RHSA-2023:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1892","reference_id":"RHSA-2023:1892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1895","reference_id":"RHSA-2023:1895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1898","reference_id":"RHSA-2023:1898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1899","reference_id":"RHSA-2023:1899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1900","reference_id":"RHSA-2023:1900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1903","reference_id":"RHSA-2023:1903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1904","reference_id":"RHSA-2023:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1905","reference_id":"RHSA-2023:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1906","reference_id":"RHSA-2023:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1907","reference_id":"RHSA-2023:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1908","reference_id":"RHSA-2023:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1909","reference_id":"RHSA-2023:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1910","reference_id":"RHSA-2023:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1911","reference_id":"RHSA-2023:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1912","reference_id":"RHSA-2023:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4103","reference_id":"RHSA-2023:4103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4160","reference_id":"RHSA-2023:4160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4160"},{"reference_url":"https://usn.ubuntu.com/6077-1/","reference_id":"USN-6077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21930"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kq78-adbv-67a7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34419?format=json","vulnerability_id":"VCID-m3j8-8gff-6fg4","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14792.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14792","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40498","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40461","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889280","reference_id":"1889280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889280"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14792"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m3j8-8gff-6fg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34423?format=json","vulnerability_id":"VCID-mh6k-v939-m7hj","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14803.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14803","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12218","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12333","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12379","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12311","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12283","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889895","reference_id":"1889895","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889895"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:56:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0717","reference_id":"RHSA-2021:0717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0733","reference_id":"RHSA-2021:0733","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0736","reference_id":"RHSA-2021:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0736"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14803"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mh6k-v939-m7hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64941?format=json","vulnerability_id":"VCID-mt9c-tby1-wqe9","summary":"openjdk: Improve JMX connections (Oracle CPU 2026-01)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21925","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10163","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10232","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1026","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10125","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.102","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119","reference_id":"1126119","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429924","reference_id":"2429924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429924"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:50:27Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0847","reference_id":"RHSA-2026:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0848","reference_id":"RHSA-2026:0848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0849","reference_id":"RHSA-2026:0849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0895","reference_id":"RHSA-2026:0895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0896","reference_id":"RHSA-2026:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0897","reference_id":"RHSA-2026:0897","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0897"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0898","reference_id":"RHSA-2026:0898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0899","reference_id":"RHSA-2026:0899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0900","reference_id":"RHSA-2026:0900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0901","reference_id":"RHSA-2026:0901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0927","reference_id":"RHSA-2026:0927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0928","reference_id":"RHSA-2026:0928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0931","reference_id":"RHSA-2026:0931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0932","reference_id":"RHSA-2026:0932","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0932"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0933","reference_id":"RHSA-2026:0933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1606","reference_id":"RHSA-2026:1606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4832","reference_id":"RHSA-2026:4832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4832"},{"reference_url":"https://usn.ubuntu.com/7995-1/","reference_id":"USN-7995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7995-1/"},{"reference_url":"https://usn.ubuntu.com/7996-1/","reference_id":"USN-7996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7996-1/"},{"reference_url":"https://usn.ubuntu.com/7997-1/","reference_id":"USN-7997-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7997-1/"},{"reference_url":"https://usn.ubuntu.com/7998-1/","reference_id":"USN-7998-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7998-1/"},{"reference_url":"https://usn.ubuntu.com/8000-1/","reference_id":"USN-8000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8000-1/"},{"reference_url":"https://usn.ubuntu.com/8001-1/","reference_id":"USN-8001-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8001-1/"},{"reference_url":"https://usn.ubuntu.com/8002-1/","reference_id":"USN-8002-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8002-1/"},{"reference_url":"https://usn.ubuntu.com/8003-1/","reference_id":"USN-8003-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8003-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2026-21925"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mt9c-tby1-wqe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34373?format=json","vulnerability_id":"VCID-mumk-x95v-bfc8","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21366","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37445","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75412","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.7539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75338","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75382","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041789","reference_id":"2041789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041789"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21366"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mumk-x95v-bfc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79370?format=json","vulnerability_id":"VCID-muvh-c3he-1bax","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2894.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2894.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2894","reference_id":"","reference_type":"","scores":[{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68834","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68835","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68913","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://minerva.crocs.fi.muni.cz/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://minerva.crocs.fi.muni.cz/"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/10/02/2","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/10/02/2"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777985","reference_id":"1777985","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777985"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2894","reference_id":"CVE-2019-2894","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2894"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:32Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2894"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-muvh-c3he-1bax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39543?format=json","vulnerability_id":"VCID-mwfy-hus1-37gt","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2593.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2593","reference_id":"","reference_type":"","scores":[{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0064","scoring_system":"epss","scoring_elements":"0.70477","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790884","reference_id":"1790884","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790884"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0465","reference_id":"RHSA-2020:0465","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0467","reference_id":"RHSA-2020:0467","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0468","reference_id":"RHSA-2020:0468","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0469","reference_id":"RHSA-2020:0469","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0470","reference_id":"RHSA-2020:0470","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0856","reference_id":"RHSA-2020:0856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0856"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:39Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2593"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwfy-hus1-37gt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74710?format=json","vulnerability_id":"VCID-n71d-tx76-vbbd","summary":"OpenJDK: Out-of-bounds access in 2D image handling (8324559)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21145.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21145","reference_id":"","reference_type":"","scores":[{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.6363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63636","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63647","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63609","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297976","reference_id":"2297976","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297976"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240719-0008/","reference_id":"ntap-20240719-0008","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240719-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4560","reference_id":"RHSA-2024:4560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4561","reference_id":"RHSA-2024:4561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4562","reference_id":"RHSA-2024:4562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4563","reference_id":"RHSA-2024:4563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4564","reference_id":"RHSA-2024:4564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4565","reference_id":"RHSA-2024:4565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4566","reference_id":"RHSA-2024:4566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4567","reference_id":"RHSA-2024:4567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4568","reference_id":"RHSA-2024:4568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4569","reference_id":"RHSA-2024:4569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4570","reference_id":"RHSA-2024:4570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4571","reference_id":"RHSA-2024:4571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4572","reference_id":"RHSA-2024:4572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4573","reference_id":"RHSA-2024:4573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4573"},{"reference_url":"https://usn.ubuntu.com/6929-1/","reference_id":"USN-6929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6929-1/"},{"reference_url":"https://usn.ubuntu.com/6930-1/","reference_id":"USN-6930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6930-1/"},{"reference_url":"https://usn.ubuntu.com/6931-1/","reference_id":"USN-6931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6931-1/"},{"reference_url":"https://usn.ubuntu.com/6932-1/","reference_id":"USN-6932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6932-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21145"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n71d-tx76-vbbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34354?format=json","vulnerability_id":"VCID-ne6z-gg9f-qkcy","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21282","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33007","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32887","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041435","reference_id":"2041435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041435"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21282"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ne6z-gg9f-qkcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31970?format=json","vulnerability_id":"VCID-nr6u-aysf-7kgk","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20919.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20919","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3822","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38228","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257853","reference_id":"2257853","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257853"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0222","reference_id":"RHSA-2024:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0223","reference_id":"RHSA-2024:0223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0224","reference_id":"RHSA-2024:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0225","reference_id":"RHSA-2024:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0226","reference_id":"RHSA-2024:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0228","reference_id":"RHSA-2024:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0230","reference_id":"RHSA-2024:0230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0231","reference_id":"RHSA-2024:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0232","reference_id":"RHSA-2024:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0233","reference_id":"RHSA-2024:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0234","reference_id":"RHSA-2024:0234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0235","reference_id":"RHSA-2024:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0237","reference_id":"RHSA-2024:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0239","reference_id":"RHSA-2024:0239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0240","reference_id":"RHSA-2024:0240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0241","reference_id":"RHSA-2024:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0242","reference_id":"RHSA-2024:0242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0244","reference_id":"RHSA-2024:0244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0246","reference_id":"RHSA-2024:0246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0247","reference_id":"RHSA-2024:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0248","reference_id":"RHSA-2024:0248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0249","reference_id":"RHSA-2024:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0250","reference_id":"RHSA-2024:0250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0265","reference_id":"RHSA-2024:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0266","reference_id":"RHSA-2024:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0267","reference_id":"RHSA-2024:0267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0267"},{"reference_url":"https://usn.ubuntu.com/6660-1/","reference_id":"USN-6660-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6660-1/"},{"reference_url":"https://usn.ubuntu.com/6661-1/","reference_id":"USN-6661-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6661-1/"},{"reference_url":"https://usn.ubuntu.com/6662-1/","reference_id":"USN-6662-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6662-1/"},{"reference_url":"https://usn.ubuntu.com/6696-1/","reference_id":"USN-6696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6696-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-20919"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nr6u-aysf-7kgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71990?format=json","vulnerability_id":"VCID-ntga-y6cv-a3df","summary":"openjdk: Enhance array handling (Oracle CPU 2025-01)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21502","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42064","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42092","published_at":"2026-04-04T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42081","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338992","reference_id":"2338992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338992"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.16:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.12:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u431:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:29:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0421","reference_id":"RHSA-2025:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0422","reference_id":"RHSA-2025:0422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0423","reference_id":"RHSA-2025:0423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0424","reference_id":"RHSA-2025:0424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0425","reference_id":"RHSA-2025:0425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0425"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0426","reference_id":"RHSA-2025:0426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0427","reference_id":"RHSA-2025:0427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0428","reference_id":"RHSA-2025:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0429","reference_id":"RHSA-2025:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1154","reference_id":"RHSA-2025:1154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2615","reference_id":"RHSA-2025:2615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2615"},{"reference_url":"https://usn.ubuntu.com/7252-1/","reference_id":"USN-7252-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7252-1/"},{"reference_url":"https://usn.ubuntu.com/7253-1/","reference_id":"USN-7253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7253-1/"},{"reference_url":"https://usn.ubuntu.com/7254-1/","reference_id":"USN-7254-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7254-1/"},{"reference_url":"https://usn.ubuntu.com/7255-1/","reference_id":"USN-7255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7255-1/"},{"reference_url":"https://usn.ubuntu.com/7338-1/","reference_id":"USN-7338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7338-1/"},{"reference_url":"https://usn.ubuntu.com/7339-1/","reference_id":"USN-7339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7339-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-21502"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ntga-y6cv-a3df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79384?format=json","vulnerability_id":"VCID-nw7e-6j5f-ebfa","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2992.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2992.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2992","reference_id":"","reference_type":"","scores":[{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75585","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75649","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75668","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75598","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75587","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75618","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761146","reference_id":"1761146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761146"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2992","reference_id":"CVE-2019-2992","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:38Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2992"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nw7e-6j5f-ebfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66831?format=json","vulnerability_id":"VCID-nxx8-nehy-qyhg","summary":"openjdk: Enhance Path Factories (Oracle CPU 2025-10)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53066.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53066","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17241","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17207","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944","reference_id":"1118944","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118944"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403063","reference_id":"2403063","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403063"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T19:44:34Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18814","reference_id":"RHSA-2025:18814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18815","reference_id":"RHSA-2025:18815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18816","reference_id":"RHSA-2025:18816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18817","reference_id":"RHSA-2025:18817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18818","reference_id":"RHSA-2025:18818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18819","reference_id":"RHSA-2025:18819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18820","reference_id":"RHSA-2025:18820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18821","reference_id":"RHSA-2025:18821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18822","reference_id":"RHSA-2025:18822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18823","reference_id":"RHSA-2025:18823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18824","reference_id":"RHSA-2025:18824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18825","reference_id":"RHSA-2025:18825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18826","reference_id":"RHSA-2025:18826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21485","reference_id":"RHSA-2025:21485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22370","reference_id":"RHSA-2025:22370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22672","reference_id":"RHSA-2025:22672","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22672"},{"reference_url":"https://usn.ubuntu.com/7881-1/","reference_id":"USN-7881-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7881-1/"},{"reference_url":"https://usn.ubuntu.com/7882-1/","reference_id":"USN-7882-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7882-1/"},{"reference_url":"https://usn.ubuntu.com/7883-1/","reference_id":"USN-7883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7883-1/"},{"reference_url":"https://usn.ubuntu.com/7884-1/","reference_id":"USN-7884-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7884-1/"},{"reference_url":"https://usn.ubuntu.com/7885-1/","reference_id":"USN-7885-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7885-1/"},{"reference_url":"https://usn.ubuntu.com/7900-1/","reference_id":"USN-7900-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7900-1/"},{"reference_url":"https://usn.ubuntu.com/7901-1/","reference_id":"USN-7901-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7901-1/"},{"reference_url":"https://usn.ubuntu.com/7902-1/","reference_id":"USN-7902-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7902-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-53066"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nxx8-nehy-qyhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34350?format=json","vulnerability_id":"VCID-p5ye-19wy-ayb8","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35603","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31435","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3157","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31477","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31613","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015311","reference_id":"2015311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015311"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://security.archlinux.org/AVG-2477","reference_id":"AVG-2477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2477"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://www.debian.org/security/2021/dsa-5012","reference_id":"dsa-5012","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/"}],"url":"https://www.debian.org/security/2021/dsa-5012"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:52:57Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4135","reference_id":"RHSA-2021:4135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4531","reference_id":"RHSA-2021:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4532","reference_id":"RHSA-2021:4532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35603"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5ye-19wy-ayb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68624?format=json","vulnerability_id":"VCID-p9na-7jta-9yg4","summary":"openjdk: Enhance TLS protocol support (Oracle CPU 2025-07)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30754.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30754","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30077","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29952","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30352","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30305","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30396","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376784","reference_id":"2376784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376784"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T15:31:20Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10861","reference_id":"RHSA-2025:10861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10862","reference_id":"RHSA-2025:10862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10863","reference_id":"RHSA-2025:10863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10864","reference_id":"RHSA-2025:10864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10865","reference_id":"RHSA-2025:10865","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10866","reference_id":"RHSA-2025:10866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10867","reference_id":"RHSA-2025:10867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10868","reference_id":"RHSA-2025:10868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10869","reference_id":"RHSA-2025:10869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10870","reference_id":"RHSA-2025:10870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10873","reference_id":"RHSA-2025:10873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10874","reference_id":"RHSA-2025:10874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10875","reference_id":"RHSA-2025:10875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13656","reference_id":"RHSA-2025:13656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13675","reference_id":"RHSA-2025:13675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13675"},{"reference_url":"https://usn.ubuntu.com/7667-1/","reference_id":"USN-7667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7667-1/"},{"reference_url":"https://usn.ubuntu.com/7668-1/","reference_id":"USN-7668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7668-1/"},{"reference_url":"https://usn.ubuntu.com/7669-1/","reference_id":"USN-7669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7669-1/"},{"reference_url":"https://usn.ubuntu.com/7672-1/","reference_id":"USN-7672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7672-1/"},{"reference_url":"https://usn.ubuntu.com/7673-1/","reference_id":"USN-7673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7673-1/"},{"reference_url":"https://usn.ubuntu.com/7674-1/","reference_id":"USN-7674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7674-1/"},{"reference_url":"https://usn.ubuntu.com/7690-1/","reference_id":"USN-7690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7690-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-30754"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9na-7jta-9yg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46007?format=json","vulnerability_id":"VCID-psrh-rb6j-afh7","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2830.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2830","reference_id":"","reference_type":"","scores":[{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44773","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44855","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10318","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10318"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823542","reference_id":"1823542","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823542"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2830","reference_id":"CVE-2020-2830","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2830"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1507","reference_id":"RHSA-2020:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1508","reference_id":"RHSA-2020:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:52Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2830"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psrh-rb6j-afh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78478?format=json","vulnerability_id":"VCID-q5gr-6u92-6ybk","summary":"OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21938.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21938","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25149","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24993","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25029","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25047","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957","reference_id":"1035957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280","reference_id":"1036280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187758","reference_id":"2187758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187758"},{"reference_url":"https://www.debian.org/security/2023/dsa-5430","reference_id":"dsa-5430","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/"}],"url":"https://www.debian.org/security/2023/dsa-5430"},{"reference_url":"https://www.debian.org/security/2023/dsa-5478","reference_id":"dsa-5478","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/"}],"url":"https://www.debian.org/security/2023/dsa-5478"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0008/","reference_id":"ntap-20230427-0008","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1875","reference_id":"RHSA-2023:1875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1877","reference_id":"RHSA-2023:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1878","reference_id":"RHSA-2023:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1879","reference_id":"RHSA-2023:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1880","reference_id":"RHSA-2023:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1882","reference_id":"RHSA-2023:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1883","reference_id":"RHSA-2023:1883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1884","reference_id":"RHSA-2023:1884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1885","reference_id":"RHSA-2023:1885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1889","reference_id":"RHSA-2023:1889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1890","reference_id":"RHSA-2023:1890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1891","reference_id":"RHSA-2023:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1892","reference_id":"RHSA-2023:1892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1895","reference_id":"RHSA-2023:1895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1898","reference_id":"RHSA-2023:1898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1899","reference_id":"RHSA-2023:1899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1900","reference_id":"RHSA-2023:1900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1903","reference_id":"RHSA-2023:1903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1904","reference_id":"RHSA-2023:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1905","reference_id":"RHSA-2023:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1906","reference_id":"RHSA-2023:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1907","reference_id":"RHSA-2023:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1908","reference_id":"RHSA-2023:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1909","reference_id":"RHSA-2023:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1910","reference_id":"RHSA-2023:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1911","reference_id":"RHSA-2023:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1912","reference_id":"RHSA-2023:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4103","reference_id":"RHSA-2023:4103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4160","reference_id":"RHSA-2023:4160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4160"},{"reference_url":"https://usn.ubuntu.com/6077-1/","reference_id":"USN-6077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21938"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q5gr-6u92-6ybk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74709?format=json","vulnerability_id":"VCID-q9r9-wkqu-6bhu","summary":"OpenJDK: Pack200 increase loading time due to improper header validation (8322106)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21144.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21144","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14855","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14909","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1487","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14962","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297964","reference_id":"2297964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297964"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:20:24Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240719-0007/","reference_id":"ntap-20240719-0007","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:20:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240719-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4560","reference_id":"RHSA-2024:4560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4561","reference_id":"RHSA-2024:4561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4562","reference_id":"RHSA-2024:4562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4563","reference_id":"RHSA-2024:4563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4564","reference_id":"RHSA-2024:4564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4565","reference_id":"RHSA-2024:4565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4566","reference_id":"RHSA-2024:4566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4567","reference_id":"RHSA-2024:4567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4567"},{"reference_url":"https://usn.ubuntu.com/6929-1/","reference_id":"USN-6929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6929-1/"},{"reference_url":"https://usn.ubuntu.com/6930-1/","reference_id":"USN-6930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6930-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21144"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q9r9-wkqu-6bhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79360?format=json","vulnerability_id":"VCID-qnt2-2g34-6yas","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2745.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2745","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21203","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21161","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21303","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21313","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21272","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730411","reference_id":"1730411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730411"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"cpujul2019-5072835.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:19Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300","reference_id":"index?page=content&id=SB10300","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:19Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10300"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1810","reference_id":"RHSA-2019:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1811","reference_id":"RHSA-2019:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1815","reference_id":"RHSA-2019:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1816","reference_id":"RHSA-2019:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1817","reference_id":"RHSA-2019:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1839","reference_id":"RHSA-2019:1839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1840","reference_id":"RHSA-2019:1840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1840"},{"reference_url":"https://usn.ubuntu.com/4080-1/","reference_id":"USN-4080-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:19Z/"}],"url":"https://usn.ubuntu.com/4080-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037802?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.4%2B11-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-1d6t-ndfc-m7hg"},{"vulnerability":"VCID-1nr6-3bq8-nbfn"},{"vulnerability":"VCID-1pdg-7bbt-kqfz"},{"vulnerability":"VCID-2ggq-ccut-5ycs"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-2wfy-nmqn-mkfe"},{"vulnerability":"VCID-347b-v3k9-b7cp"},{"vulnerability":"VCID-39gh-uwky-kke9"},{"vulnerability":"VCID-3aae-859j-1bg9"},{"vulnerability":"VCID-3b1m-995s-r7a8"},{"vulnerability":"VCID-3hj5-z3ck-tkha"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-3v2y-qzfu-nydb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-4thy-7844-xuc9"},{"vulnerability":"VCID-4trq-2j9e-bbfd"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-5wj6-ejpa-3kft"},{"vulnerability":"VCID-5xg6-kds9-g3hf"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-64zz-esk6-y3fy"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6ywn-1kuf-1ufb"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-74uc-nfy5-fbfx"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-7913-mqsn-3bd8"},{"vulnerability":"VCID-7c1s-f99n-bfds"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8fmy-hu1v-nqct"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-93n5-e3u3-kugs"},{"vulnerability":"VCID-95d9-a86j-tkdy"},{"vulnerability":"VCID-97bv-kegv-uyd9"},{"vulnerability":"VCID-98bc-5jrc-5kas"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a129-wbcc-yqec"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-a95g-84vs-xbav"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-cena-jspa-2ba7"},{"vulnerability":"VCID-chp9-6c8n-xufp"},{"vulnerability":"VCID-d6wf-827v-a7c3"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-ey12-2uq3-6bar"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-g2fj-4mgh-23fs"},{"vulnerability":"VCID-gfxx-m9ud-rybe"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-he8f-erpk-sqh8"},{"vulnerability":"VCID-hg8h-z7af-pqe3"},{"vulnerability":"VCID-hmzc-b2h5-ryh2"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-htq1-a17u-4bh3"},{"vulnerability":"VCID-hx4c-96gx-2fbq"},{"vulnerability":"VCID-jc9v-4116-4yas"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jr6p-7nkg-1fe9"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-k3xn-hbrs-nkab"},{"vulnerability":"VCID-kd25-3buc-cqdy"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-m3j8-8gff-6fg4"},{"vulnerability":"VCID-mh6k-v939-m7hj"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-mumk-x95v-bfc8"},{"vulnerability":"VCID-muvh-c3he-1bax"},{"vulnerability":"VCID-mwfy-hus1-37gt"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-ne6z-gg9f-qkcy"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nw7e-6j5f-ebfa"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p5ye-19wy-ayb8"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-psrh-rb6j-afh7"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rgbz-akft-f7e6"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-rmqx-pseh-q7a7"},{"vulnerability":"VCID-rpdj-d7je-47cs"},{"vulnerability":"VCID-s4d4-pvtj-8ucp"},{"vulnerability":"VCID-shg1-t3nh-67hk"},{"vulnerability":"VCID-spnj-gvva-efet"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-tekc-e66p-tyba"},{"vulnerability":"VCID-tkw1-8js4-h7cw"},{"vulnerability":"VCID-tna8-m3b1-nkhn"},{"vulnerability":"VCID-tpng-ppye-m7hv"},{"vulnerability":"VCID-tr4r-wm4s-auej"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-upb2-1jmf-3udy"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-vssb-tgq1-p3g8"},{"vulnerability":"VCID-wfjr-ddp6-mkd5"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-wrfc-9msj-hqbc"},{"vulnerability":"VCID-ws4h-edpn-nudd"},{"vulnerability":"VCID-wyfq-yjf2-c7dy"},{"vulnerability":"VCID-wz73-dwgr-3bf7"},{"vulnerability":"VCID-x3wp-bdkr-7fa8"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xfqx-d3jw-yuhn"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-xrec-qf6z-2ua9"},{"vulnerability":"VCID-y5qu-j3wt-wuej"},{"vulnerability":"VCID-y78f-qgn6-rua7"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-y8wp-rpgd-kfht"},{"vulnerability":"VCID-ycgg-4fpn-b3at"},{"vulnerability":"VCID-yqsu-y2mw-pqgt"},{"vulnerability":"VCID-yvf2-2a33-zqat"},{"vulnerability":"VCID-yxk8-59zb-y7g2"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zh9v-47ue-p7ep"},{"vulnerability":"VCID-zkz6-9t74-5bb4"},{"vulnerability":"VCID-zr4f-wpm3-f3an"},{"vulnerability":"VCID-ztx2-xh6v-nke1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.4%252B11-1"}],"aliases":["CVE-2019-2745"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qnt2-2g34-6yas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53969?format=json","vulnerability_id":"VCID-rfs8-njaq-qkc8","summary":"Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets\nThe Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.\n\nA fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.","references":[{"reference_url":"http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34169","reference_id":"","reference_type":"","scores":[{"value":"0.06658","scoring_system":"epss","scoring_elements":"0.91212","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06658","scoring_system":"epss","scoring_elements":"0.91206","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06658","scoring_system":"epss","scoring_elements":"0.91199","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06658","scoring_system":"epss","scoring_elements":"0.91186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06658","scoring_system":"epss","scoring_elements":"0.91216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06658","scoring_system":"epss","scoring_elements":"0.91215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08992","scoring_system":"epss","scoring_elements":"0.92592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08992","scoring_system":"epss","scoring_elements":"0.92585","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitbox.apache.org/repos/asf?p=xalan-java.git","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://gitbox.apache.org/repos/asf?p=xalan-java.git"},{"reference_url":"https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81"},{"reference_url":"https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573"},{"reference_url":"https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21"},{"reference_url":"https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw"},{"reference_url":"https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8"},{"reference_url":"https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-34169","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-34169"},{"reference_url":"https://security.gentoo.org/glsa/202401-25","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/202401-25"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220729-0009","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20220729-0009"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0006","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"reference_url":"https://www.debian.org/security/2022/dsa-5188","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2022/dsa-5188"},{"reference_url":"https://www.debian.org/security/2022/dsa-5192","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2022/dsa-5192"},{"reference_url":"https://www.debian.org/security/2022/dsa-5256","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2022/dsa-5256"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2022.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"reference_url":"https://xalan.apache.org","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://xalan.apache.org"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/07/19/5","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2022/07/19/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/07/19/6","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2022/07/19/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/07/20/2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2022/07/20/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/07/20/3","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2022/07/20/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/10/18/2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2022/10/18/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/04/8","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2022/11/04/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/07/2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2022/11/07/2"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860","reference_id":"1015860","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108554","reference_id":"2108554","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108554"},{"reference_url":"https://github.com/advisories/GHSA-9339-86wc-4qgf","reference_id":"GHSA-9339-86wc-4qgf","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-9339-86wc-4qgf"},{"reference_url":"https://security.gentoo.org/glsa/202405-16","reference_id":"GLSA-202405-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5681","reference_id":"RHSA-2022:5681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5683","reference_id":"RHSA-2022:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5684","reference_id":"RHSA-2022:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5685","reference_id":"RHSA-2022:5685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5687","reference_id":"RHSA-2022:5687","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5687"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5695","reference_id":"RHSA-2022:5695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5696","reference_id":"RHSA-2022:5696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5697","reference_id":"RHSA-2022:5697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5698","reference_id":"RHSA-2022:5698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5700","reference_id":"RHSA-2022:5700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5701","reference_id":"RHSA-2022:5701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5709","reference_id":"RHSA-2022:5709","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5709"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5726","reference_id":"RHSA-2022:5726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5736","reference_id":"RHSA-2022:5736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5753","reference_id":"RHSA-2022:5753","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5754","reference_id":"RHSA-2022:5754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5755","reference_id":"RHSA-2022:5755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5756","reference_id":"RHSA-2022:5756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5757","reference_id":"RHSA-2022:5757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5758","reference_id":"RHSA-2022:5758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5758"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3708","reference_id":"RHSA-2024:3708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3708"},{"reference_url":"https://usn.ubuntu.com/5546-1/","reference_id":"USN-5546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-1/"},{"reference_url":"https://usn.ubuntu.com/5546-2/","reference_id":"USN-5546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2022-34169","GHSA-9339-86wc-4qgf"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rfs8-njaq-qkc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34362?format=json","vulnerability_id":"VCID-rgbz-akft-f7e6","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21296","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33007","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32887","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041439","reference_id":"2041439","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041439"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21296"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-akft-f7e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74713?format=json","vulnerability_id":"VCID-rggy-f3va-mfay","summary":"OpenJDK: RangeCheckElimination array index overflow (8323231)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21147","reference_id":"","reference_type":"","scores":[{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.7248","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72485","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.7249","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.7244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72458","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297977","reference_id":"2297977","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297977"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240719-0008/","reference_id":"ntap-20240719-0008","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-17T13:58:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240719-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4560","reference_id":"RHSA-2024:4560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4561","reference_id":"RHSA-2024:4561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4562","reference_id":"RHSA-2024:4562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4563","reference_id":"RHSA-2024:4563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4564","reference_id":"RHSA-2024:4564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4565","reference_id":"RHSA-2024:4565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4566","reference_id":"RHSA-2024:4566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4567","reference_id":"RHSA-2024:4567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4568","reference_id":"RHSA-2024:4568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4569","reference_id":"RHSA-2024:4569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4570","reference_id":"RHSA-2024:4570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4571","reference_id":"RHSA-2024:4571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4572","reference_id":"RHSA-2024:4572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4573","reference_id":"RHSA-2024:4573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4573"},{"reference_url":"https://usn.ubuntu.com/6929-1/","reference_id":"USN-6929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6929-1/"},{"reference_url":"https://usn.ubuntu.com/6930-1/","reference_id":"USN-6930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6930-1/"},{"reference_url":"https://usn.ubuntu.com/6931-1/","reference_id":"USN-6931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6931-1/"},{"reference_url":"https://usn.ubuntu.com/6932-1/","reference_id":"USN-6932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6932-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21147"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rggy-f3va-mfay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34338?format=json","vulnerability_id":"VCID-rmqx-pseh-q7a7","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35550","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23201","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23303","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23166","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015648","reference_id":"2015648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015648"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/","reference_id":"7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/","reference_id":"DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/","reference_id":"V362B2BWTH5IJDL45QPQGMBKIQOG7JX5","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T14:29:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35550"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmqx-pseh-q7a7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34405?format=json","vulnerability_id":"VCID-rpdj-d7je-47cs","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14573.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14573","reference_id":"","reference_type":"","scores":[{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59737","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59621","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59717","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59739","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59752","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59756","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856951","reference_id":"1856951","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856951"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202008-24","reference_id":"GLSA-202008-24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"https://security.gentoo.org/glsa/202008-24"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","reference_id":"MEPHBZPNSLX43B26DWKB7OS6AROTS2BO","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","reference_id":"QQUMIAON2YEFRONMIUVHAKYCIOLICDBA","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2969","reference_id":"RHSA-2020:2969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2970","reference_id":"RHSA-2020:2970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3098","reference_id":"RHSA-2020:3098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3099","reference_id":"RHSA-2020:3099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3099"},{"reference_url":"https://usn.ubuntu.com/4433-1/","reference_id":"USN-4433-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:03Z/"}],"url":"https://usn.ubuntu.com/4433-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14573"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rpdj-d7je-47cs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45958?format=json","vulnerability_id":"VCID-s4d4-pvtj-8ucp","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2781.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2781","reference_id":"","reference_type":"","scores":[{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48847","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48893","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48897","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4883","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48889","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48898","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10318","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10318"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823960","reference_id":"1823960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823960"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.0:hotfix3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.1.1:hotfix3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:hotfix1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:hotfix1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.2.0:hotfix1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:hotfix1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:hotfix1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.0:hotfix1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:2.3.1:hotfix2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2781","reference_id":"CVE-2020-2781","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2781"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1507","reference_id":"RHSA-2020:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1508","reference_id":"RHSA-2020:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:57:27Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2781"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s4d4-pvtj-8ucp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34365?format=json","vulnerability_id":"VCID-shg1-t3nh-67hk","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21305","reference_id":"","reference_type":"","scores":[{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45878","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.4587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45877","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041878","reference_id":"2041878","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041878"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21305"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-shg1-t3nh-67hk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39546?format=json","vulnerability_id":"VCID-spnj-gvva-efet","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2604.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2604","reference_id":"","reference_type":"","scores":[{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.8224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01699","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790944","reference_id":"1790944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790944"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0465","reference_id":"RHSA-2020:0465","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0467","reference_id":"RHSA-2020:0467","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0468","reference_id":"RHSA-2020:0468","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0469","reference_id":"RHSA-2020:0469","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0470","reference_id":"RHSA-2020:0470","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0856","reference_id":"RHSA-2020:0856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0856"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:05Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2604"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-spnj-gvva-efet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79363?format=json","vulnerability_id":"VCID-t3tz-zcy8-rkdz","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2786.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2786.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2786","reference_id":"","reference_type":"","scores":[{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63774","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63789","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63721","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63661","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63752","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730255","reference_id":"1730255","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730255"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"cpujul2019-5072835.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:35Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1810","reference_id":"RHSA-2019:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1811","reference_id":"RHSA-2019:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1815","reference_id":"RHSA-2019:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1816","reference_id":"RHSA-2019:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1817","reference_id":"RHSA-2019:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1839","reference_id":"RHSA-2019:1839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1840","reference_id":"RHSA-2019:1840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2585","reference_id":"RHSA-2019:2585","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2590","reference_id":"RHSA-2019:2590","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2592","reference_id":"RHSA-2019:2592","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2737","reference_id":"RHSA-2019:2737","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2737"},{"reference_url":"https://usn.ubuntu.com/4080-1/","reference_id":"USN-4080-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:35Z/"}],"url":"https://usn.ubuntu.com/4080-1/"},{"reference_url":"https://usn.ubuntu.com/4083-1/","reference_id":"USN-4083-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:35Z/"}],"url":"https://usn.ubuntu.com/4083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037802?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.4%2B11-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-1d6t-ndfc-m7hg"},{"vulnerability":"VCID-1nr6-3bq8-nbfn"},{"vulnerability":"VCID-1pdg-7bbt-kqfz"},{"vulnerability":"VCID-2ggq-ccut-5ycs"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-2wfy-nmqn-mkfe"},{"vulnerability":"VCID-347b-v3k9-b7cp"},{"vulnerability":"VCID-39gh-uwky-kke9"},{"vulnerability":"VCID-3aae-859j-1bg9"},{"vulnerability":"VCID-3b1m-995s-r7a8"},{"vulnerability":"VCID-3hj5-z3ck-tkha"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-3v2y-qzfu-nydb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-4thy-7844-xuc9"},{"vulnerability":"VCID-4trq-2j9e-bbfd"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-5wj6-ejpa-3kft"},{"vulnerability":"VCID-5xg6-kds9-g3hf"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-64zz-esk6-y3fy"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6ywn-1kuf-1ufb"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-74uc-nfy5-fbfx"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-7913-mqsn-3bd8"},{"vulnerability":"VCID-7c1s-f99n-bfds"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8fmy-hu1v-nqct"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-93n5-e3u3-kugs"},{"vulnerability":"VCID-95d9-a86j-tkdy"},{"vulnerability":"VCID-97bv-kegv-uyd9"},{"vulnerability":"VCID-98bc-5jrc-5kas"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a129-wbcc-yqec"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-a95g-84vs-xbav"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-cena-jspa-2ba7"},{"vulnerability":"VCID-chp9-6c8n-xufp"},{"vulnerability":"VCID-d6wf-827v-a7c3"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-ey12-2uq3-6bar"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-g2fj-4mgh-23fs"},{"vulnerability":"VCID-gfxx-m9ud-rybe"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-he8f-erpk-sqh8"},{"vulnerability":"VCID-hg8h-z7af-pqe3"},{"vulnerability":"VCID-hmzc-b2h5-ryh2"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-htq1-a17u-4bh3"},{"vulnerability":"VCID-hx4c-96gx-2fbq"},{"vulnerability":"VCID-jc9v-4116-4yas"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jr6p-7nkg-1fe9"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-k3xn-hbrs-nkab"},{"vulnerability":"VCID-kd25-3buc-cqdy"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-m3j8-8gff-6fg4"},{"vulnerability":"VCID-mh6k-v939-m7hj"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-mumk-x95v-bfc8"},{"vulnerability":"VCID-muvh-c3he-1bax"},{"vulnerability":"VCID-mwfy-hus1-37gt"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-ne6z-gg9f-qkcy"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nw7e-6j5f-ebfa"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p5ye-19wy-ayb8"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-psrh-rb6j-afh7"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rgbz-akft-f7e6"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-rmqx-pseh-q7a7"},{"vulnerability":"VCID-rpdj-d7je-47cs"},{"vulnerability":"VCID-s4d4-pvtj-8ucp"},{"vulnerability":"VCID-shg1-t3nh-67hk"},{"vulnerability":"VCID-spnj-gvva-efet"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-tekc-e66p-tyba"},{"vulnerability":"VCID-tkw1-8js4-h7cw"},{"vulnerability":"VCID-tna8-m3b1-nkhn"},{"vulnerability":"VCID-tpng-ppye-m7hv"},{"vulnerability":"VCID-tr4r-wm4s-auej"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-upb2-1jmf-3udy"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-vssb-tgq1-p3g8"},{"vulnerability":"VCID-wfjr-ddp6-mkd5"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-wrfc-9msj-hqbc"},{"vulnerability":"VCID-ws4h-edpn-nudd"},{"vulnerability":"VCID-wyfq-yjf2-c7dy"},{"vulnerability":"VCID-wz73-dwgr-3bf7"},{"vulnerability":"VCID-x3wp-bdkr-7fa8"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xfqx-d3jw-yuhn"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-xrec-qf6z-2ua9"},{"vulnerability":"VCID-y5qu-j3wt-wuej"},{"vulnerability":"VCID-y78f-qgn6-rua7"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-y8wp-rpgd-kfht"},{"vulnerability":"VCID-ycgg-4fpn-b3at"},{"vulnerability":"VCID-yqsu-y2mw-pqgt"},{"vulnerability":"VCID-yvf2-2a33-zqat"},{"vulnerability":"VCID-yxk8-59zb-y7g2"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zh9v-47ue-p7ep"},{"vulnerability":"VCID-zkz6-9t74-5bb4"},{"vulnerability":"VCID-zr4f-wpm3-f3an"},{"vulnerability":"VCID-ztx2-xh6v-nke1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.4%252B11-1"}],"aliases":["CVE-2019-2786"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t3tz-zcy8-rkdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60301?format=json","vulnerability_id":"VCID-t4r8-ujpb-5kdk","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21541","reference_id":"","reference_type":"","scores":[{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6077","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60781","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108543","reference_id":"2108543","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2108543"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/","reference_id":"H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/","reference_id":"I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/","reference_id":"JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/","reference_id":"KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/","reference_id":"L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220729-0009/","reference_id":"ntap-20220729-0009","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220729-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5681","reference_id":"RHSA-2022:5681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5683","reference_id":"RHSA-2022:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5684","reference_id":"RHSA-2022:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5685","reference_id":"RHSA-2022:5685","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5685"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5687","reference_id":"RHSA-2022:5687","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5687"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5695","reference_id":"RHSA-2022:5695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5696","reference_id":"RHSA-2022:5696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5697","reference_id":"RHSA-2022:5697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5698","reference_id":"RHSA-2022:5698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5700","reference_id":"RHSA-2022:5700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5701","reference_id":"RHSA-2022:5701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5709","reference_id":"RHSA-2022:5709","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5709"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5726","reference_id":"RHSA-2022:5726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5736","reference_id":"RHSA-2022:5736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5753","reference_id":"RHSA-2022:5753","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5754","reference_id":"RHSA-2022:5754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5755","reference_id":"RHSA-2022:5755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5756","reference_id":"RHSA-2022:5756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5757","reference_id":"RHSA-2022:5757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5758","reference_id":"RHSA-2022:5758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5758"},{"reference_url":"https://usn.ubuntu.com/5546-1/","reference_id":"USN-5546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-1/"},{"reference_url":"https://usn.ubuntu.com/5546-2/","reference_id":"USN-5546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/","reference_id":"YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-11T20:42:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2022-21541"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t4r8-ujpb-5kdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34427?format=json","vulnerability_id":"VCID-t5sp-ea5b-f7af","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21626.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21626","reference_id":"","reference_type":"","scores":[{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47488","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.4749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47511","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47494","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133753","reference_id":"2133753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133753"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6999","reference_id":"RHSA-2022:6999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7000","reference_id":"RHSA-2022:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7001","reference_id":"RHSA-2022:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7002","reference_id":"RHSA-2022:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7003","reference_id":"RHSA-2022:7003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7004","reference_id":"RHSA-2022:7004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7005","reference_id":"RHSA-2022:7005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7006","reference_id":"RHSA-2022:7006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7007","reference_id":"RHSA-2022:7007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7008","reference_id":"RHSA-2022:7008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7009","reference_id":"RHSA-2022:7009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7010","reference_id":"RHSA-2022:7010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7011","reference_id":"RHSA-2022:7011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7012","reference_id":"RHSA-2022:7012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7013","reference_id":"RHSA-2022:7013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7049","reference_id":"RHSA-2022:7049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7050","reference_id":"RHSA-2022:7050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7051","reference_id":"RHSA-2022:7051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7052","reference_id":"RHSA-2022:7052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7053","reference_id":"RHSA-2022:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7054","reference_id":"RHSA-2022:7054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8880","reference_id":"RHSA-2022:8880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0128","reference_id":"RHSA-2023:0128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0128"},{"reference_url":"https://usn.ubuntu.com/5719-1/","reference_id":"USN-5719-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5719-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2022-21626"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t5sp-ea5b-f7af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34403?format=json","vulnerability_id":"VCID-tekc-e66p-tyba","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14556.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14556","reference_id":"","reference_type":"","scores":[{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68816","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68797","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68728","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68839","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856896","reference_id":"1856896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856896"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","reference_id":"6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","reference_id":"DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202008-24","reference_id":"GLSA-202008-24","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://security.gentoo.org/glsa/202008-24"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","reference_id":"MEPHBZPNSLX43B26DWKB7OS6AROTS2BO","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","reference_id":"QQUMIAON2YEFRONMIUVHAKYCIOLICDBA","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2968","reference_id":"RHSA-2020:2968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2969","reference_id":"RHSA-2020:2969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2970","reference_id":"RHSA-2020:2970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2972","reference_id":"RHSA-2020:2972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2985","reference_id":"RHSA-2020:2985","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3098","reference_id":"RHSA-2020:3098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3099","reference_id":"RHSA-2020:3099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3100","reference_id":"RHSA-2020:3100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3101","reference_id":"RHSA-2020:3101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4433-1/","reference_id":"USN-4433-1","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://usn.ubuntu.com/4433-1/"},{"reference_url":"https://usn.ubuntu.com/4453-1/","reference_id":"USN-4453-1","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:18Z/"}],"url":"https://usn.ubuntu.com/4453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14556"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tekc-e66p-tyba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79373?format=json","vulnerability_id":"VCID-tkw1-8js4-h7cw","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2949.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2949.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2949","reference_id":"","reference_type":"","scores":[{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67974","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67913","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67955","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68008","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://support.f5.com/csp/article/K54213762?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://support.f5.com/csp/article/K54213762?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761594","reference_id":"1761594","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761594"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2949","reference_id":"CVE-2019-2949","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:41Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2949"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tkw1-8js4-h7cw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34357?format=json","vulnerability_id":"VCID-tna8-m3b1-nkhn","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21291","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32017","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32799","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32785","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32832","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041831","reference_id":"2041831","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041831"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21291"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tna8-m3b1-nkhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34409?format=json","vulnerability_id":"VCID-tpng-ppye-m7hv","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14579.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14579.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14579","reference_id":"","reference_type":"","scores":[{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36691","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36682","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856995","reference_id":"1856995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856995"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","reference_id":"6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","reference_id":"DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202008-24","reference_id":"GLSA-202008-24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"https://security.gentoo.org/glsa/202008-24"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2968","reference_id":"RHSA-2020:2968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2972","reference_id":"RHSA-2020:2972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2985","reference_id":"RHSA-2020:2985","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3100","reference_id":"RHSA-2020:3100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3101","reference_id":"RHSA-2020:3101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4453-1/","reference_id":"USN-4453-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:53Z/"}],"url":"https://usn.ubuntu.com/4453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14579"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tpng-ppye-m7hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34367?format=json","vulnerability_id":"VCID-tr4r-wm4s-auej","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21340","reference_id":"","reference_type":"","scores":[{"value":"0.06446","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06446","scoring_system":"epss","scoring_elements":"0.91031","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06446","scoring_system":"epss","scoring_elements":"0.9104","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06446","scoring_system":"epss","scoring_elements":"0.91052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06446","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06446","scoring_system":"epss","scoring_elements":"0.91067","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041884","reference_id":"2041884","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041884"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21340"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tr4r-wm4s-auej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70363?format=json","vulnerability_id":"VCID-u81s-cs95-4yhx","summary":"openjdk: Better TLS connection support (Oracle CPU 2025-04)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21587.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21587","reference_id":"","reference_type":"","scores":[{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.687","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68746","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68789","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00575","scoring_system":"epss","scoring_elements":"0.68748","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897","reference_id":"1103897","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898","reference_id":"1103898","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899","reference_id":"1103899","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900","reference_id":"1103900","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359695","reference_id":"2359695","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359695"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-17T03:55:41Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3844","reference_id":"RHSA-2025:3844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3845","reference_id":"RHSA-2025:3845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3846","reference_id":"RHSA-2025:3846","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3846"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3847","reference_id":"RHSA-2025:3847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3848","reference_id":"RHSA-2025:3848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3849","reference_id":"RHSA-2025:3849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3850","reference_id":"RHSA-2025:3850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3852","reference_id":"RHSA-2025:3852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3853","reference_id":"RHSA-2025:3853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3854","reference_id":"RHSA-2025:3854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3855","reference_id":"RHSA-2025:3855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3856","reference_id":"RHSA-2025:3856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3857","reference_id":"RHSA-2025:3857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7508","reference_id":"RHSA-2025:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8063","reference_id":"RHSA-2025:8063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8431","reference_id":"RHSA-2025:8431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8431"},{"reference_url":"https://usn.ubuntu.com/7480-1/","reference_id":"USN-7480-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7480-1/"},{"reference_url":"https://usn.ubuntu.com/7481-1/","reference_id":"USN-7481-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7481-1/"},{"reference_url":"https://usn.ubuntu.com/7482-1/","reference_id":"USN-7482-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7482-1/"},{"reference_url":"https://usn.ubuntu.com/7483-1/","reference_id":"USN-7483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7483-1/"},{"reference_url":"https://usn.ubuntu.com/7484-1/","reference_id":"USN-7484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7484-1/"},{"reference_url":"https://usn.ubuntu.com/7531-1/","reference_id":"USN-7531-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7531-1/"},{"reference_url":"https://usn.ubuntu.com/7533-1/","reference_id":"USN-7533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7533-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-21587"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u81s-cs95-4yhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34331?format=json","vulnerability_id":"VCID-u9xe-x4f1-9fc8","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2163.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2163","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26911","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26777","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26852","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951217","reference_id":"1951217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951217"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/","reference_id":"5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/"},{"reference_url":"https://security.archlinux.org/AVG-1847","reference_id":"AVG-1847","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1847"},{"reference_url":"https://security.archlinux.org/AVG-1848","reference_id":"AVG-1848","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1848"},{"reference_url":"https://security.archlinux.org/AVG-1849","reference_id":"AVG-1849","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1849"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/","reference_id":"CFXOKM2233JVGYDOWW77BN54X3GZTIBK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/","reference_id":"CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/"},{"reference_url":"https://www.debian.org/security/2021/dsa-4899","reference_id":"dsa-4899","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://www.debian.org/security/2021/dsa-4899"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/","reference_id":"MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/","reference_id":"MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210513-0001/","reference_id":"ntap-20210513-0001","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210513-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1297","reference_id":"RHSA-2021:1297","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1298","reference_id":"RHSA-2021:1298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1299","reference_id":"RHSA-2021:1299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1301","reference_id":"RHSA-2021:1301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1305","reference_id":"RHSA-2021:1305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1306","reference_id":"RHSA-2021:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1307","reference_id":"RHSA-2021:1307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1315","reference_id":"RHSA-2021:1315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1444","reference_id":"RHSA-2021:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1445","reference_id":"RHSA-2021:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1446","reference_id":"RHSA-2021:1446","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1446"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1447","reference_id":"RHSA-2021:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6735","reference_id":"RHSA-2022:6735","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6735"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6755","reference_id":"RHSA-2022:6755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6756","reference_id":"RHSA-2022:6756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6756"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/","reference_id":"UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/"},{"reference_url":"https://usn.ubuntu.com/4892-1/","reference_id":"USN-4892-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4892-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-2163"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9xe-x4f1-9fc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82357?format=json","vulnerability_id":"VCID-ujqg-82c5-syda","summary":"OpenJDK: Incorrect handling of certificate status messages during TLS handshake (JSSE, 8222678)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2821.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2821","reference_id":"","reference_type":"","scores":[{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.79858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.7985","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.79902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.79923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.79906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.79879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.79866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01324","scoring_system":"epss","scoring_elements":"0.79895","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730251","reference_id":"1730251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1730251"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"cpujul2019-5072835.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:44Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1810","reference_id":"RHSA-2019:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1810"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1817","reference_id":"RHSA-2019:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1817"},{"reference_url":"https://usn.ubuntu.com/4083-1/","reference_id":"USN-4083-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:44Z/"}],"url":"https://usn.ubuntu.com/4083-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037802?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.4%2B11-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-1d6t-ndfc-m7hg"},{"vulnerability":"VCID-1nr6-3bq8-nbfn"},{"vulnerability":"VCID-1pdg-7bbt-kqfz"},{"vulnerability":"VCID-2ggq-ccut-5ycs"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-2wfy-nmqn-mkfe"},{"vulnerability":"VCID-347b-v3k9-b7cp"},{"vulnerability":"VCID-39gh-uwky-kke9"},{"vulnerability":"VCID-3aae-859j-1bg9"},{"vulnerability":"VCID-3b1m-995s-r7a8"},{"vulnerability":"VCID-3hj5-z3ck-tkha"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-3v2y-qzfu-nydb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-4thy-7844-xuc9"},{"vulnerability":"VCID-4trq-2j9e-bbfd"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-5wj6-ejpa-3kft"},{"vulnerability":"VCID-5xg6-kds9-g3hf"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-61c5-8468-33c8"},{"vulnerability":"VCID-64zz-esk6-y3fy"},{"vulnerability":"VCID-6wtu-f43b-1ue9"},{"vulnerability":"VCID-6ywn-1kuf-1ufb"},{"vulnerability":"VCID-6zn4-b8k4-3bcn"},{"vulnerability":"VCID-74uc-nfy5-fbfx"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-7913-mqsn-3bd8"},{"vulnerability":"VCID-7c1s-f99n-bfds"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8fmy-hu1v-nqct"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-93n5-e3u3-kugs"},{"vulnerability":"VCID-95d9-a86j-tkdy"},{"vulnerability":"VCID-97bv-kegv-uyd9"},{"vulnerability":"VCID-98bc-5jrc-5kas"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a129-wbcc-yqec"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-a95g-84vs-xbav"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-cena-jspa-2ba7"},{"vulnerability":"VCID-chp9-6c8n-xufp"},{"vulnerability":"VCID-d6wf-827v-a7c3"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-ey12-2uq3-6bar"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-g2fj-4mgh-23fs"},{"vulnerability":"VCID-gfxx-m9ud-rybe"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-gksn-mb6g-rue5"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-hdz7-kcy9-juah"},{"vulnerability":"VCID-he8f-erpk-sqh8"},{"vulnerability":"VCID-hg8h-z7af-pqe3"},{"vulnerability":"VCID-hmzc-b2h5-ryh2"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-htq1-a17u-4bh3"},{"vulnerability":"VCID-hx4c-96gx-2fbq"},{"vulnerability":"VCID-jc9v-4116-4yas"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jr6p-7nkg-1fe9"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-k3xn-hbrs-nkab"},{"vulnerability":"VCID-kd25-3buc-cqdy"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-m3j8-8gff-6fg4"},{"vulnerability":"VCID-mh6k-v939-m7hj"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-mumk-x95v-bfc8"},{"vulnerability":"VCID-muvh-c3he-1bax"},{"vulnerability":"VCID-mwfy-hus1-37gt"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-ne6z-gg9f-qkcy"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nw7e-6j5f-ebfa"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p5ye-19wy-ayb8"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-psrh-rb6j-afh7"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rgbz-akft-f7e6"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-rmqx-pseh-q7a7"},{"vulnerability":"VCID-rpdj-d7je-47cs"},{"vulnerability":"VCID-s4d4-pvtj-8ucp"},{"vulnerability":"VCID-shg1-t3nh-67hk"},{"vulnerability":"VCID-spnj-gvva-efet"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-tekc-e66p-tyba"},{"vulnerability":"VCID-tkw1-8js4-h7cw"},{"vulnerability":"VCID-tna8-m3b1-nkhn"},{"vulnerability":"VCID-tpng-ppye-m7hv"},{"vulnerability":"VCID-tr4r-wm4s-auej"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-u9xe-x4f1-9fc8"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-upb2-1jmf-3udy"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-vssb-tgq1-p3g8"},{"vulnerability":"VCID-wfjr-ddp6-mkd5"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-wrfc-9msj-hqbc"},{"vulnerability":"VCID-ws4h-edpn-nudd"},{"vulnerability":"VCID-wyfq-yjf2-c7dy"},{"vulnerability":"VCID-wz73-dwgr-3bf7"},{"vulnerability":"VCID-x3wp-bdkr-7fa8"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xfqx-d3jw-yuhn"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-xrec-qf6z-2ua9"},{"vulnerability":"VCID-y5qu-j3wt-wuej"},{"vulnerability":"VCID-y78f-qgn6-rua7"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-y8wp-rpgd-kfht"},{"vulnerability":"VCID-ycgg-4fpn-b3at"},{"vulnerability":"VCID-yqsu-y2mw-pqgt"},{"vulnerability":"VCID-yvf2-2a33-zqat"},{"vulnerability":"VCID-yxk8-59zb-y7g2"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zh9v-47ue-p7ep"},{"vulnerability":"VCID-zkz6-9t74-5bb4"},{"vulnerability":"VCID-zr4f-wpm3-f3an"},{"vulnerability":"VCID-ztx2-xh6v-nke1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.4%252B11-1"}],"aliases":["CVE-2019-2821"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ujqg-82c5-syda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34428?format=json","vulnerability_id":"VCID-um54-6ggz-gqf9","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21628","reference_id":"","reference_type":"","scores":[{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48105","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48119","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00248","scoring_system":"epss","scoring_elements":"0.48094","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133769","reference_id":"2133769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2133769"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/","reference_id":"37QDWJBGEPP65X43NXQTXQ7KASLUHON6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/","reference_id":"3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/","reference_id":"3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/","reference_id":"EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/","reference_id":"HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0012/","reference_id":"ntap-20221028-0012","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0012/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/","reference_id":"PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-23T16:44:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6999","reference_id":"RHSA-2022:6999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7000","reference_id":"RHSA-2022:7000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7001","reference_id":"RHSA-2022:7001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7002","reference_id":"RHSA-2022:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7003","reference_id":"RHSA-2022:7003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7004","reference_id":"RHSA-2022:7004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7005","reference_id":"RHSA-2022:7005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7006","reference_id":"RHSA-2022:7006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7007","reference_id":"RHSA-2022:7007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7008","reference_id":"RHSA-2022:7008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7009","reference_id":"RHSA-2022:7009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7010","reference_id":"RHSA-2022:7010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7011","reference_id":"RHSA-2022:7011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7012","reference_id":"RHSA-2022:7012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7013","reference_id":"RHSA-2022:7013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7049","reference_id":"RHSA-2022:7049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7050","reference_id":"RHSA-2022:7050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7051","reference_id":"RHSA-2022:7051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7052","reference_id":"RHSA-2022:7052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7053","reference_id":"RHSA-2022:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7054","reference_id":"RHSA-2022:7054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8880","reference_id":"RHSA-2022:8880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0128","reference_id":"RHSA-2023:0128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0128"},{"reference_url":"https://usn.ubuntu.com/5719-1/","reference_id":"USN-5719-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5719-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2022-21628"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-um54-6ggz-gqf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34421?format=json","vulnerability_id":"VCID-upb2-1jmf-3udy","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14797.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14797","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35582","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35805","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35731","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35754","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35718","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889717","reference_id":"1889717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889717"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0530","reference_id":"RHSA-2021:0530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0530"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14797"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upb2-1jmf-3udy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68627?format=json","vulnerability_id":"VCID-vbw8-4j9f-eya5","summary":"openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50106.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50106","reference_id":"","reference_type":"","scores":[{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46089","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4924","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49267","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50106"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379031","reference_id":"2379031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2379031"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:22:48Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10861","reference_id":"RHSA-2025:10861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10862","reference_id":"RHSA-2025:10862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10863","reference_id":"RHSA-2025:10863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10864","reference_id":"RHSA-2025:10864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10865","reference_id":"RHSA-2025:10865","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10866","reference_id":"RHSA-2025:10866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10867","reference_id":"RHSA-2025:10867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10868","reference_id":"RHSA-2025:10868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10869","reference_id":"RHSA-2025:10869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10870","reference_id":"RHSA-2025:10870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10873","reference_id":"RHSA-2025:10873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10874","reference_id":"RHSA-2025:10874","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10875","reference_id":"RHSA-2025:10875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13656","reference_id":"RHSA-2025:13656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13675","reference_id":"RHSA-2025:13675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0934","reference_id":"RHSA-2026:0934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"reference_url":"https://usn.ubuntu.com/7667-1/","reference_id":"USN-7667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7667-1/"},{"reference_url":"https://usn.ubuntu.com/7668-1/","reference_id":"USN-7668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7668-1/"},{"reference_url":"https://usn.ubuntu.com/7669-1/","reference_id":"USN-7669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7669-1/"},{"reference_url":"https://usn.ubuntu.com/7672-1/","reference_id":"USN-7672-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7672-1/"},{"reference_url":"https://usn.ubuntu.com/7673-1/","reference_id":"USN-7673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7673-1/"},{"reference_url":"https://usn.ubuntu.com/7674-1/","reference_id":"USN-7674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7674-1/"},{"reference_url":"https://usn.ubuntu.com/7690-1/","reference_id":"USN-7690-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7690-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-50106"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbw8-4j9f-eya5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31978?format=json","vulnerability_id":"VCID-vpnc-yu7r-bqb6","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21208","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17169","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17096","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17111","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696","reference_id":"1085696","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318526","reference_id":"2318526","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318526"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.15:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.11:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10926","reference_id":"RHSA-2024:10926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8116","reference_id":"RHSA-2024:8116","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8117","reference_id":"RHSA-2024:8117","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8117"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8118","reference_id":"RHSA-2024:8118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8119","reference_id":"RHSA-2024:8119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8120","reference_id":"RHSA-2024:8120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8121","reference_id":"RHSA-2024:8121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8122","reference_id":"RHSA-2024:8122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8123","reference_id":"RHSA-2024:8123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8124","reference_id":"RHSA-2024:8124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8125","reference_id":"RHSA-2024:8125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8126","reference_id":"RHSA-2024:8126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8127","reference_id":"RHSA-2024:8127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8128","reference_id":"RHSA-2024:8128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8129","reference_id":"RHSA-2024:8129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8129"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"},{"reference_url":"https://usn.ubuntu.com/7099-1/","reference_id":"USN-7099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7099-1/"},{"reference_url":"https://usn.ubuntu.com/7124-1/","reference_id":"USN-7124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7124-1/"},{"reference_url":"https://usn.ubuntu.com/7338-1/","reference_id":"USN-7338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7338-1/"},{"reference_url":"https://usn.ubuntu.com/7339-1/","reference_id":"USN-7339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7339-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2024-21208"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vpnc-yu7r-bqb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34418?format=json","vulnerability_id":"VCID-vssb-tgq1-p3g8","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14782.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14782","reference_id":"","reference_type":"","scores":[{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34634","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34795","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34791","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889290","reference_id":"1889290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889290"},{"reference_url":"https://www.debian.org/security/2020/dsa-4779","reference_id":"dsa-4779","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"https://www.debian.org/security/2020/dsa-4779"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html","reference_id":"msg00031.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20201023-0004/","reference_id":"ntap-20201023-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20201023-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4305","reference_id":"RHSA-2020:4305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4306","reference_id":"RHSA-2020:4306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4307","reference_id":"RHSA-2020:4307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4316","reference_id":"RHSA-2020:4316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4347","reference_id":"RHSA-2020:4347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4348","reference_id":"RHSA-2020:4348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4349","reference_id":"RHSA-2020:4349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4350","reference_id":"RHSA-2020:4350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4352","reference_id":"RHSA-2020:4352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5586","reference_id":"RHSA-2020:5586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0717","reference_id":"RHSA-2021:0717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0736","reference_id":"RHSA-2021:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0736"},{"reference_url":"https://usn.ubuntu.com/4607-1/","reference_id":"USN-4607-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-1/"},{"reference_url":"https://usn.ubuntu.com/4607-2/","reference_id":"USN-4607-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4607-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14782"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vssb-tgq1-p3g8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34413?format=json","vulnerability_id":"VCID-wfjr-ddp6-mkd5","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14621.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14621.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14621","reference_id":"","reference_type":"","scores":[{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64139","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64112","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64138","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00461","scoring_system":"epss","scoring_elements":"0.64055","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856885","reference_id":"1856885","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856885"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","reference_id":"6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","reference_id":"DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202008-24","reference_id":"GLSA-202008-24","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://security.gentoo.org/glsa/202008-24"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","reference_id":"MEPHBZPNSLX43B26DWKB7OS6AROTS2BO","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","reference_id":"QQUMIAON2YEFRONMIUVHAKYCIOLICDBA","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/"},{"reference_url":"https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E","reference_id":"rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2968","reference_id":"RHSA-2020:2968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2969","reference_id":"RHSA-2020:2969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2970","reference_id":"RHSA-2020:2970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2972","reference_id":"RHSA-2020:2972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2985","reference_id":"RHSA-2020:2985","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3098","reference_id":"RHSA-2020:3098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3099","reference_id":"RHSA-2020:3099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3100","reference_id":"RHSA-2020:3100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3101","reference_id":"RHSA-2020:3101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4433-1/","reference_id":"USN-4433-1","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://usn.ubuntu.com/4433-1/"},{"reference_url":"https://usn.ubuntu.com/4453-1/","reference_id":"USN-4453-1","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:09Z/"}],"url":"https://usn.ubuntu.com/4453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14621"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wfjr-ddp6-mkd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31969?format=json","vulnerability_id":"VCID-wn4r-ugaa-5ydb","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20918.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20918","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46888","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46936","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257728","reference_id":"2257728","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257728"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html","reference_id":"msg00023.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0002/","reference_id":"ntap-20240201-0002","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-25T05:01:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0222","reference_id":"RHSA-2024:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0223","reference_id":"RHSA-2024:0223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0224","reference_id":"RHSA-2024:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0225","reference_id":"RHSA-2024:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0226","reference_id":"RHSA-2024:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0228","reference_id":"RHSA-2024:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0230","reference_id":"RHSA-2024:0230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0231","reference_id":"RHSA-2024:0231","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0232","reference_id":"RHSA-2024:0232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0233","reference_id":"RHSA-2024:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0234","reference_id":"RHSA-2024:0234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0235","reference_id":"RHSA-2024:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0237","reference_id":"RHSA-2024:0237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0239","reference_id":"RHSA-2024:0239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0240","reference_id":"RHSA-2024:0240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0241","reference_id":"RHSA-2024:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0242","reference_id":"RHSA-2024:0242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0244","reference_id":"RHSA-2024:0244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0246","reference_id":"RHSA-2024:0246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0247","reference_id":"RHSA-2024:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0248","reference_id":"RHSA-2024:0248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0249","reference_id":"RHSA-2024:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0250","reference_id":"RHSA-2024:0250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0265","reference_id":"RHSA-2024:0265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0266","reference_id":"RHSA-2024:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0267","reference_id":"RHSA-2024:0267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1481","reference_id":"RHSA-2024:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1482","reference_id":"RHSA-2024:1482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1482"},{"reference_url":"https://usn.ubuntu.com/6660-1/","reference_id":"USN-6660-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6660-1/"},{"reference_url":"https://usn.ubuntu.com/6661-1/","reference_id":"USN-6661-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6661-1/"},{"reference_url":"https://usn.ubuntu.com/6662-1/","reference_id":"USN-6662-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6662-1/"},{"reference_url":"https://usn.ubuntu.com/6696-1/","reference_id":"USN-6696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6696-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-20918"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wn4r-ugaa-5ydb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45933?format=json","vulnerability_id":"VCID-wrfc-9msj-hqbc","summary":"Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2757.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2757.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2757","reference_id":"","reference_type":"","scores":[{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49425","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49446","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49428","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10332"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.debian.org/security/2020/dsa-4668","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://www.debian.org/security/2020/dsa-4668"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823216","reference_id":"1823216","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823216"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2757","reference_id":"CVE-2020-2757","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2757"},{"reference_url":"https://security.gentoo.org/glsa/202006-22","reference_id":"GLSA-202006-22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://security.gentoo.org/glsa/202006-22"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1506","reference_id":"RHSA-2020:1506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1507","reference_id":"RHSA-2020:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1508","reference_id":"RHSA-2020:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1512","reference_id":"RHSA-2020:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1515","reference_id":"RHSA-2020:1515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1516","reference_id":"RHSA-2020:1516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2236","reference_id":"RHSA-2020:2236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2237","reference_id":"RHSA-2020:2237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2238","reference_id":"RHSA-2020:2238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2239","reference_id":"RHSA-2020:2239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2241","reference_id":"RHSA-2020:2241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2241"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:05Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2757"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wrfc-9msj-hqbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34363?format=json","vulnerability_id":"VCID-ws4h-edpn-nudd","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21299","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26933","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2672","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26841","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041472","reference_id":"2041472","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041472"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4918","reference_id":"RHSA-2022:4918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4919","reference_id":"RHSA-2022:4919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4922","reference_id":"RHSA-2022:4922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4957","reference_id":"RHSA-2022:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4957"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21299"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-edpn-nudd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34336?format=json","vulnerability_id":"VCID-wyfq-yjf2-c7dy","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2388","reference_id":"","reference_type":"","scores":[{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74086","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74134","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.7414","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74158","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74091","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74122","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983075","reference_id":"1983075","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983075"},{"reference_url":"https://security.archlinux.org/ASA-202107-53","reference_id":"ASA-202107-53","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-53"},{"reference_url":"https://security.archlinux.org/ASA-202107-54","reference_id":"ASA-202107-54","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-54"},{"reference_url":"https://security.archlinux.org/ASA-202107-65","reference_id":"ASA-202107-65","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-65"},{"reference_url":"https://security.archlinux.org/ASA-202107-66","reference_id":"ASA-202107-66","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-66"},{"reference_url":"https://security.archlinux.org/AVG-2188","reference_id":"AVG-2188","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2188"},{"reference_url":"https://security.archlinux.org/AVG-2189","reference_id":"AVG-2189","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2189"},{"reference_url":"https://security.archlinux.org/AVG-2190","reference_id":"AVG-2190","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2190"},{"reference_url":"https://www.debian.org/security/2021/dsa-4946","reference_id":"dsa-4946","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/"}],"url":"https://www.debian.org/security/2021/dsa-4946"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210723-0002/","reference_id":"ntap-20210723-0002","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210723-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2774","reference_id":"RHSA-2021:2774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2775","reference_id":"RHSA-2021:2775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2776","reference_id":"RHSA-2021:2776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2777","reference_id":"RHSA-2021:2777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2778","reference_id":"RHSA-2021:2778","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2779","reference_id":"RHSA-2021:2779","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2780","reference_id":"RHSA-2021:2780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2781","reference_id":"RHSA-2021:2781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2782","reference_id":"RHSA-2021:2782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2783","reference_id":"RHSA-2021:2783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2784","reference_id":"RHSA-2021:2784","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2845","reference_id":"RHSA-2021:2845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2845"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-2388"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wyfq-yjf2-c7dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79371?format=json","vulnerability_id":"VCID-wz73-dwgr-3bf7","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2945.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2945","reference_id":"","reference_type":"","scores":[{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52892","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52863","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52876","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761596","reference_id":"1761596","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761596"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2945","reference_id":"CVE-2019-2945","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:48Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2945"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wz73-dwgr-3bf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79377?format=json","vulnerability_id":"VCID-x3wp-bdkr-7fa8","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2975.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2975","reference_id":"","reference_type":"","scores":[{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65378","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65502","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65454","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760969","reference_id":"1760969","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760969"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:epolicy_orchestrator:5.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2975","reference_id":"CVE-2019-2975","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"},{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:04Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2975"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x3wp-bdkr-7fa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31957?format=json","vulnerability_id":"VCID-x4ms-sbj7-aufu","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22006.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22006.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22006","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35226","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3522","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35196","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221626","reference_id":"2221626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221626"},{"reference_url":"https://security.gentoo.org/glsa/202407-24","reference_id":"GLSA-202407-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-24"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4157","reference_id":"RHSA-2023:4157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4158","reference_id":"RHSA-2023:4158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4159","reference_id":"RHSA-2023:4159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4161","reference_id":"RHSA-2023:4161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4162","reference_id":"RHSA-2023:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4163","reference_id":"RHSA-2023:4163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4164","reference_id":"RHSA-2023:4164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4165","reference_id":"RHSA-2023:4165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4169","reference_id":"RHSA-2023:4169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4170","reference_id":"RHSA-2023:4170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4171","reference_id":"RHSA-2023:4171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4175","reference_id":"RHSA-2023:4175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4177","reference_id":"RHSA-2023:4177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4208","reference_id":"RHSA-2023:4208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4210","reference_id":"RHSA-2023:4210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4211","reference_id":"RHSA-2023:4211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4233","reference_id":"RHSA-2023:4233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4233"},{"reference_url":"https://usn.ubuntu.com/6263-1/","reference_id":"USN-6263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6263-1/"},{"reference_url":"https://usn.ubuntu.com/6272-1/","reference_id":"USN-6272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-22006"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4ms-sbj7-aufu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34351?format=json","vulnerability_id":"VCID-xfqx-d3jw-yuhn","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21248","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2418","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24153","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2428","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24237","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041801","reference_id":"2041801","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041801"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/","reference_id":"2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/","reference_id":"4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5057","reference_id":"dsa-5057","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/"}],"url":"https://www.debian.org/security/2022/dsa-5057"},{"reference_url":"https://www.debian.org/security/2022/dsa-5058","reference_id":"dsa-5058","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/"}],"url":"https://www.debian.org/security/2022/dsa-5058"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/","reference_id":"KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0007/","reference_id":"ntap-20220121-0007","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:14Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0304","reference_id":"RHSA-2022:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0305","reference_id":"RHSA-2022:0305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0306","reference_id":"RHSA-2022:0306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0307","reference_id":"RHSA-2022:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0312","reference_id":"RHSA-2022:0312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0317","reference_id":"RHSA-2022:0317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0321","reference_id":"RHSA-2022:0321","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0968","reference_id":"RHSA-2022:0968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0969","reference_id":"RHSA-2022:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0970","reference_id":"RHSA-2022:0970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0970"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21248"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xfqx-d3jw-yuhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78476?format=json","vulnerability_id":"VCID-xk2v-7cgk-13ex","summary":"OpenJDK: certificate validation issue in TLS session negotiation (8298310)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21967.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21967.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21967","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2175","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21607","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21805","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21664","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957","reference_id":"1035957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280","reference_id":"1036280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187704","reference_id":"2187704","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187704"},{"reference_url":"https://www.debian.org/security/2023/dsa-5430","reference_id":"dsa-5430","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/"}],"url":"https://www.debian.org/security/2023/dsa-5430"},{"reference_url":"https://www.debian.org/security/2023/dsa-5478","reference_id":"dsa-5478","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/"}],"url":"https://www.debian.org/security/2023/dsa-5478"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0008/","reference_id":"ntap-20230427-0008","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:34:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1875","reference_id":"RHSA-2023:1875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1877","reference_id":"RHSA-2023:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1878","reference_id":"RHSA-2023:1878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1879","reference_id":"RHSA-2023:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1880","reference_id":"RHSA-2023:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1882","reference_id":"RHSA-2023:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1883","reference_id":"RHSA-2023:1883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1884","reference_id":"RHSA-2023:1884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1885","reference_id":"RHSA-2023:1885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1889","reference_id":"RHSA-2023:1889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1890","reference_id":"RHSA-2023:1890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1891","reference_id":"RHSA-2023:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1892","reference_id":"RHSA-2023:1892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1895","reference_id":"RHSA-2023:1895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1898","reference_id":"RHSA-2023:1898","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1898"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1899","reference_id":"RHSA-2023:1899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1900","reference_id":"RHSA-2023:1900","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1900"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1903","reference_id":"RHSA-2023:1903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1904","reference_id":"RHSA-2023:1904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1905","reference_id":"RHSA-2023:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1906","reference_id":"RHSA-2023:1906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1907","reference_id":"RHSA-2023:1907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1908","reference_id":"RHSA-2023:1908","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1909","reference_id":"RHSA-2023:1909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1910","reference_id":"RHSA-2023:1910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1911","reference_id":"RHSA-2023:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1912","reference_id":"RHSA-2023:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4103","reference_id":"RHSA-2023:4103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4160","reference_id":"RHSA-2023:4160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4160"},{"reference_url":"https://usn.ubuntu.com/6077-1/","reference_id":"USN-6077-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6077-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2023-21967"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xk2v-7cgk-13ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81424?format=json","vulnerability_id":"VCID-xrec-qf6z-2ua9","summary":"OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2778.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2778","reference_id":"","reference_type":"","scores":[{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62856","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.6282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62895","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0004/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0004/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4662","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/"}],"url":"https://www.debian.org/security/2020/dsa-4662"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823879","reference_id":"1823879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823879"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2778","reference_id":"CVE-2020-2778","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1509","reference_id":"RHSA-2020:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1514","reference_id":"RHSA-2020:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1517","reference_id":"RHSA-2020:1517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1517"},{"reference_url":"https://usn.ubuntu.com/4337-1/","reference_id":"USN-4337-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:35Z/"}],"url":"https://usn.ubuntu.com/4337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2778"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xrec-qf6z-2ua9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79489?format=json","vulnerability_id":"VCID-y5qu-j3wt-wuej","summary":"OpenJDK: URI parsing inconsistencies (JNDI, 8278972)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21496","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29164","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29269","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29275","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21496"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075849","reference_id":"2075849","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075849"},{"reference_url":"https://security.archlinux.org/AVG-2686","reference_id":"AVG-2686","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2686"},{"reference_url":"https://security.archlinux.org/AVG-2687","reference_id":"AVG-2687","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2687"},{"reference_url":"https://security.archlinux.org/AVG-2688","reference_id":"AVG-2688","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2688"},{"reference_url":"https://security.archlinux.org/AVG-2689","reference_id":"AVG-2689","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2689"},{"reference_url":"https://www.debian.org/security/2022/dsa-5128","reference_id":"dsa-5128","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/"}],"url":"https://www.debian.org/security/2022/dsa-5128"},{"reference_url":"https://www.debian.org/security/2022/dsa-5131","reference_id":"dsa-5131","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/"}],"url":"https://www.debian.org/security/2022/dsa-5131"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0006/","reference_id":"ntap-20220429-0006","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-24T13:53:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1435","reference_id":"RHSA-2022:1435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1436","reference_id":"RHSA-2022:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1437","reference_id":"RHSA-2022:1437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1438","reference_id":"RHSA-2022:1438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1439","reference_id":"RHSA-2022:1439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1440","reference_id":"RHSA-2022:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1441","reference_id":"RHSA-2022:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1442","reference_id":"RHSA-2022:1442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1443","reference_id":"RHSA-2022:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1444","reference_id":"RHSA-2022:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1445","reference_id":"RHSA-2022:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1487","reference_id":"RHSA-2022:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1488","reference_id":"RHSA-2022:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1489","reference_id":"RHSA-2022:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1490","reference_id":"RHSA-2022:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1491","reference_id":"RHSA-2022:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1492","reference_id":"RHSA-2022:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1728","reference_id":"RHSA-2022:1728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1729","reference_id":"RHSA-2022:1729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2137","reference_id":"RHSA-2022:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4957","reference_id":"RHSA-2022:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4959","reference_id":"RHSA-2022:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5837","reference_id":"RHSA-2022:5837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5837"},{"reference_url":"https://usn.ubuntu.com/5388-1/","reference_id":"USN-5388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-1/"},{"reference_url":"https://usn.ubuntu.com/5388-2/","reference_id":"USN-5388-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-2/"},{"reference_url":"https://usn.ubuntu.com/5546-1/","reference_id":"USN-5546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-1/"},{"reference_url":"https://usn.ubuntu.com/5546-2/","reference_id":"USN-5546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21496"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y5qu-j3wt-wuej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79375?format=json","vulnerability_id":"VCID-y78f-qgn6-rua7","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2964.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2964","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64884","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64771","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64849","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64857","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760963","reference_id":"1760963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760963"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2964","reference_id":"CVE-2019-2964","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2964"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:17Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2964"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y78f-qgn6-rua7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70362?format=json","vulnerability_id":"VCID-y8bc-k5qu-c7f5","summary":"openjdk: Improve compiler transformations (Oracle CPU 2025-04)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30691","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58784","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58851","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58805","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58775","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897","reference_id":"1103897","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103897"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898","reference_id":"1103898","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103898"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899","reference_id":"1103899","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103899"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900","reference_id":"1103900","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103900"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359694","reference_id":"2359694","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359694"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:24:18Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3844","reference_id":"RHSA-2025:3844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3845","reference_id":"RHSA-2025:3845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3846","reference_id":"RHSA-2025:3846","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3846"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3847","reference_id":"RHSA-2025:3847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3848","reference_id":"RHSA-2025:3848","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3848"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3849","reference_id":"RHSA-2025:3849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3850","reference_id":"RHSA-2025:3850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3852","reference_id":"RHSA-2025:3852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3853","reference_id":"RHSA-2025:3853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3854","reference_id":"RHSA-2025:3854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3855","reference_id":"RHSA-2025:3855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3856","reference_id":"RHSA-2025:3856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3857","reference_id":"RHSA-2025:3857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7508","reference_id":"RHSA-2025:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7508"},{"reference_url":"https://usn.ubuntu.com/7480-1/","reference_id":"USN-7480-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7480-1/"},{"reference_url":"https://usn.ubuntu.com/7481-1/","reference_id":"USN-7481-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7481-1/"},{"reference_url":"https://usn.ubuntu.com/7482-1/","reference_id":"USN-7482-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7482-1/"},{"reference_url":"https://usn.ubuntu.com/7483-1/","reference_id":"USN-7483-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7483-1/"},{"reference_url":"https://usn.ubuntu.com/7484-1/","reference_id":"USN-7484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7484-1/"},{"reference_url":"https://usn.ubuntu.com/7531-1/","reference_id":"USN-7531-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7531-1/"},{"reference_url":"https://usn.ubuntu.com/7533-1/","reference_id":"USN-7533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7533-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-30691"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y8bc-k5qu-c7f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34407?format=json","vulnerability_id":"VCID-y8wp-rpgd-kfht","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14578.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14578.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14578","reference_id":"","reference_type":"","scores":[{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36691","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36682","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856991","reference_id":"1856991","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856991"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","reference_id":"6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","reference_id":"DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202008-24","reference_id":"GLSA-202008-24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"https://security.gentoo.org/glsa/202008-24"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2968","reference_id":"RHSA-2020:2968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2972","reference_id":"RHSA-2020:2972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2985","reference_id":"RHSA-2020:2985","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3100","reference_id":"RHSA-2020:3100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3101","reference_id":"RHSA-2020:3101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4453-1/","reference_id":"USN-4453-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:55Z/"}],"url":"https://usn.ubuntu.com/4453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14578"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y8wp-rpgd-kfht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81673?format=json","vulnerability_id":"VCID-ycgg-4fpn-b3at","summary":"OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2655.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2655","reference_id":"","reference_type":"","scores":[{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.8423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84221","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84239","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02147","scoring_system":"epss","scoring_elements":"0.84233","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790951","reference_id":"1790951","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790951"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:43Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2655"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ycgg-4fpn-b3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34412?format=json","vulnerability_id":"VCID-yqsu-y2mw-pqgt","summary":"Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14593.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14593","reference_id":"","reference_type":"","scores":[{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61175","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61103","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61258","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856784","reference_id":"1856784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1856784"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/","reference_id":"6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/","reference_id":"DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4734","reference_id":"dsa-4734","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://www.debian.org/security/2020/dsa-4734"},{"reference_url":"https://security.gentoo.org/glsa/202008-24","reference_id":"GLSA-202008-24","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://security.gentoo.org/glsa/202008-24"},{"reference_url":"https://security.gentoo.org/glsa/202209-15","reference_id":"GLSA-202209-15","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://security.gentoo.org/glsa/202209-15"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/","reference_id":"MEPHBZPNSLX43B26DWKB7OS6AROTS2BO","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200717-0005/","reference_id":"ntap-20200717-0005","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200717-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/","reference_id":"QQUMIAON2YEFRONMIUVHAKYCIOLICDBA","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2968","reference_id":"RHSA-2020:2968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2969","reference_id":"RHSA-2020:2969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2970","reference_id":"RHSA-2020:2970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2972","reference_id":"RHSA-2020:2972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2985","reference_id":"RHSA-2020:2985","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2985"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3098","reference_id":"RHSA-2020:3098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3099","reference_id":"RHSA-2020:3099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3100","reference_id":"RHSA-2020:3100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3101","reference_id":"RHSA-2020:3101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3386","reference_id":"RHSA-2020:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3387","reference_id":"RHSA-2020:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3388","reference_id":"RHSA-2020:3388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5585","reference_id":"RHSA-2020:5585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5585"},{"reference_url":"https://usn.ubuntu.com/4433-1/","reference_id":"USN-4433-1","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://usn.ubuntu.com/4433-1/"},{"reference_url":"https://usn.ubuntu.com/4453-1/","reference_id":"USN-4453-1","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:35Z/"}],"url":"https://usn.ubuntu.com/4453-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-14593"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yqsu-y2mw-pqgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79383?format=json","vulnerability_id":"VCID-yvf2-2a33-zqat","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2989.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2989.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2989","reference_id":"","reference_type":"","scores":[{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.84795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.84804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.84809","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.84745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.84813","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.8473","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.84764","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.84766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02323","scoring_system":"epss","scoring_elements":"0.84789","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10315"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/27","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/27"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/31","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://seclists.org/bugtraq/2019/Oct/31"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0001/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191017-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4546","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://www.debian.org/security/2019/dsa-4546"},{"reference_url":"https://www.debian.org/security/2019/dsa-4548","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://www.debian.org/security/2019/dsa-4548"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761601","reference_id":"1761601","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1761601"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_id":"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:13.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update221:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2989","reference_id":"CVE-2019-2989","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2989"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3127","reference_id":"RHSA-2019:3127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3128","reference_id":"RHSA-2019:3128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3134","reference_id":"RHSA-2019:3134","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3135","reference_id":"RHSA-2019:3135","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3136","reference_id":"RHSA-2019:3136","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3157","reference_id":"RHSA-2019:3157","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3158","reference_id":"RHSA-2019:3158","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4109","reference_id":"RHSA-2019:4109","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4110","reference_id":"RHSA-2019:4110","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4113","reference_id":"RHSA-2019:4113","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4115","reference_id":"RHSA-2019:4115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:4115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0006","reference_id":"RHSA-2020:0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0046","reference_id":"RHSA-2020:0046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0046"},{"reference_url":"https://usn.ubuntu.com/4223-1/","reference_id":"USN-4223-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:42Z/"}],"url":"https://usn.ubuntu.com/4223-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2019-2989"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yvf2-2a33-zqat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34347?format=json","vulnerability_id":"VCID-yxk8-59zb-y7g2","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35578.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35578","reference_id":"","reference_type":"","scores":[{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34635","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34711","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015653","reference_id":"2015653","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2015653"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/","reference_id":"6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/"},{"reference_url":"https://security.archlinux.org/AVG-2477","reference_id":"AVG-2477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2477"},{"reference_url":"https://security.archlinux.org/AVG-2478","reference_id":"AVG-2478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2478"},{"reference_url":"https://security.archlinux.org/AVG-2479","reference_id":"AVG-2479","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2479"},{"reference_url":"https://www.debian.org/security/2021/dsa-5000","reference_id":"dsa-5000","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/"}],"url":"https://www.debian.org/security/2021/dsa-5000"},{"reference_url":"https://www.debian.org/security/2021/dsa-5012","reference_id":"dsa-5012","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/"}],"url":"https://www.debian.org/security/2021/dsa-5012"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/"}],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://security.gentoo.org/glsa/202409-26","reference_id":"GLSA-202409-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-26"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/","reference_id":"GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/","reference_id":"GXTUWAWXVU37GRNIG4TPMA47THO6VAE6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T17:53:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3884","reference_id":"RHSA-2021:3884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3885","reference_id":"RHSA-2021:3885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3886","reference_id":"RHSA-2021:3886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3886"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3887","reference_id":"RHSA-2021:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3889","reference_id":"RHSA-2021:3889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3891","reference_id":"RHSA-2021:3891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3892","reference_id":"RHSA-2021:3892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3893","reference_id":"RHSA-2021:3893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3960","reference_id":"RHSA-2021:3960","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3960"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3961","reference_id":"RHSA-2021:3961","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3961"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3967","reference_id":"RHSA-2021:3967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3968","reference_id":"RHSA-2021:3968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4135","reference_id":"RHSA-2021:4135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4531","reference_id":"RHSA-2021:4531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4532","reference_id":"RHSA-2021:4532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5030","reference_id":"RHSA-2021:5030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0345","reference_id":"RHSA-2022:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0345"},{"reference_url":"https://usn.ubuntu.com/5202-1/","reference_id":"USN-5202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5202-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2021-35578"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yxk8-59zb-y7g2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31979?format=json","vulnerability_id":"VCID-z356-tw9t-q7bp","summary":"Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21210","reference_id":"","reference_type":"","scores":[{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00144","scoring_system":"epss","scoring_elements":"0.34679","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696","reference_id":"1085696","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085696"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318524","reference_id":"2318524","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318524"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u421:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://security.gentoo.org/glsa/202412-07","reference_id":"GLSA-202412-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10926","reference_id":"RHSA-2024:10926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8116","reference_id":"RHSA-2024:8116","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8117","reference_id":"RHSA-2024:8117","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8117"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8118","reference_id":"RHSA-2024:8118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8119","reference_id":"RHSA-2024:8119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8120","reference_id":"RHSA-2024:8120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8121","reference_id":"RHSA-2024:8121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8121"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8122","reference_id":"RHSA-2024:8122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8123","reference_id":"RHSA-2024:8123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8124","reference_id":"RHSA-2024:8124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8125","reference_id":"RHSA-2024:8125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8126","reference_id":"RHSA-2024:8126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8127","reference_id":"RHSA-2024:8127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8128","reference_id":"RHSA-2024:8128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8129","reference_id":"RHSA-2024:8129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8129"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"},{"reference_url":"https://usn.ubuntu.com/7099-1/","reference_id":"USN-7099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7099-1/"},{"reference_url":"https://usn.ubuntu.com/7124-1/","reference_id":"USN-7124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7124-1/"},{"reference_url":"https://usn.ubuntu.com/7338-1/","reference_id":"USN-7338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7338-1/"},{"reference_url":"https://usn.ubuntu.com/7339-1/","reference_id":"USN-7339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7339-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2024-21210"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z356-tw9t-q7bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76843?format=json","vulnerability_id":"VCID-zdra-bzqn-4ug9","summary":"OpenJDK: integer overflow in C1 compiler address generation (8322122)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21068.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21068","reference_id":"","reference_type":"","scores":[{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67575","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.6764","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0054","scoring_system":"epss","scoring_elements":"0.67648","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678","reference_id":"1069678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069678"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275003","reference_id":"2275003","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275003"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:21.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*","reference_id":"cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u401:*:*:*:enterprise_performance:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html","reference_id":"msg00014.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0004/","reference_id":"ntap-20240426-0004","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:30:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1815","reference_id":"RHSA-2024:1815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1816","reference_id":"RHSA-2024:1816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1817","reference_id":"RHSA-2024:1817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1818","reference_id":"RHSA-2024:1818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1819","reference_id":"RHSA-2024:1819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1820","reference_id":"RHSA-2024:1820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1821","reference_id":"RHSA-2024:1821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1822","reference_id":"RHSA-2024:1822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1823","reference_id":"RHSA-2024:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1824","reference_id":"RHSA-2024:1824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1825","reference_id":"RHSA-2024:1825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1826","reference_id":"RHSA-2024:1826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1827","reference_id":"RHSA-2024:1827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1828","reference_id":"RHSA-2024:1828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1828"},{"reference_url":"https://usn.ubuntu.com/6810-1/","reference_id":"USN-6810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6810-1/"},{"reference_url":"https://usn.ubuntu.com/6811-1/","reference_id":"USN-6811-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6811-1/"},{"reference_url":"https://usn.ubuntu.com/6812-1/","reference_id":"USN-6812-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6812-1/"},{"reference_url":"https://usn.ubuntu.com/6813-1/","reference_id":"USN-6813-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6813-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21068"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zdra-bzqn-4ug9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74707?format=json","vulnerability_id":"VCID-zgpr-3zft-zqgt","summary":"OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21140.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21140","reference_id":"","reference_type":"","scores":[{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68543","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68569","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68498","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297963","reference_id":"2297963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2297963"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240719-0008/","reference_id":"ntap-20240719-0008","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:27:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240719-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4560","reference_id":"RHSA-2024:4560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4561","reference_id":"RHSA-2024:4561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4562","reference_id":"RHSA-2024:4562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4563","reference_id":"RHSA-2024:4563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4564","reference_id":"RHSA-2024:4564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4565","reference_id":"RHSA-2024:4565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4566","reference_id":"RHSA-2024:4566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4567","reference_id":"RHSA-2024:4567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4568","reference_id":"RHSA-2024:4568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4569","reference_id":"RHSA-2024:4569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4570","reference_id":"RHSA-2024:4570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4571","reference_id":"RHSA-2024:4571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4572","reference_id":"RHSA-2024:4572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4573","reference_id":"RHSA-2024:4573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4573"},{"reference_url":"https://usn.ubuntu.com/6929-1/","reference_id":"USN-6929-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6929-1/"},{"reference_url":"https://usn.ubuntu.com/6930-1/","reference_id":"USN-6930-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6930-1/"},{"reference_url":"https://usn.ubuntu.com/6931-1/","reference_id":"USN-6931-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6931-1/"},{"reference_url":"https://usn.ubuntu.com/6932-1/","reference_id":"USN-6932-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6932-1/"},{"reference_url":"https://usn.ubuntu.com/7096-1/","reference_id":"USN-7096-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7096-1/"},{"reference_url":"https://usn.ubuntu.com/7097-1/","reference_id":"USN-7097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7097-1/"},{"reference_url":"https://usn.ubuntu.com/7098-1/","reference_id":"USN-7098-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7098-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049131?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.24%2B8-2~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.24%252B8-2~deb11u1"}],"aliases":["CVE-2024-21140"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zgpr-3zft-zqgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79487?format=json","vulnerability_id":"VCID-zh9v-47ue-p7ep","summary":"OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21434","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29036","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2899","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28972","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075836","reference_id":"2075836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075836"},{"reference_url":"https://security.archlinux.org/AVG-2686","reference_id":"AVG-2686","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2686"},{"reference_url":"https://security.archlinux.org/AVG-2687","reference_id":"AVG-2687","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2687"},{"reference_url":"https://security.archlinux.org/AVG-2688","reference_id":"AVG-2688","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2688"},{"reference_url":"https://security.archlinux.org/AVG-2689","reference_id":"AVG-2689","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2689"},{"reference_url":"https://www.debian.org/security/2022/dsa-5128","reference_id":"dsa-5128","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/"}],"url":"https://www.debian.org/security/2022/dsa-5128"},{"reference_url":"https://www.debian.org/security/2022/dsa-5131","reference_id":"dsa-5131","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/"}],"url":"https://www.debian.org/security/2022/dsa-5131"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0006/","reference_id":"ntap-20220429-0006","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-02T19:51:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1435","reference_id":"RHSA-2022:1435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1436","reference_id":"RHSA-2022:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1437","reference_id":"RHSA-2022:1437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1438","reference_id":"RHSA-2022:1438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1439","reference_id":"RHSA-2022:1439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1440","reference_id":"RHSA-2022:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1441","reference_id":"RHSA-2022:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1442","reference_id":"RHSA-2022:1442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1443","reference_id":"RHSA-2022:1443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1444","reference_id":"RHSA-2022:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1445","reference_id":"RHSA-2022:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1487","reference_id":"RHSA-2022:1487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1488","reference_id":"RHSA-2022:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1489","reference_id":"RHSA-2022:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1490","reference_id":"RHSA-2022:1490","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1491","reference_id":"RHSA-2022:1491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1492","reference_id":"RHSA-2022:1492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1728","reference_id":"RHSA-2022:1728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1729","reference_id":"RHSA-2022:1729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2137","reference_id":"RHSA-2022:2137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4957","reference_id":"RHSA-2022:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4959","reference_id":"RHSA-2022:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5837","reference_id":"RHSA-2022:5837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5837"},{"reference_url":"https://usn.ubuntu.com/5388-1/","reference_id":"USN-5388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-1/"},{"reference_url":"https://usn.ubuntu.com/5388-2/","reference_id":"USN-5388-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5388-2/"},{"reference_url":"https://usn.ubuntu.com/5546-1/","reference_id":"USN-5546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-1/"},{"reference_url":"https://usn.ubuntu.com/5546-2/","reference_id":"USN-5546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21434"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zh9v-47ue-p7ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68626?format=json","vulnerability_id":"VCID-zkz6-9t74-5bb4","summary":"openjdk: Improve scripting supports (Oracle CPU 2025-07)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30761.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30761.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30761","reference_id":"","reference_type":"","scores":[{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34495","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.3439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.4067","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30761"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376786","reference_id":"2376786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2376786"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-18T14:43:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10861","reference_id":"RHSA-2025:10861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10862","reference_id":"RHSA-2025:10862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10863","reference_id":"RHSA-2025:10863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10864","reference_id":"RHSA-2025:10864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10865","reference_id":"RHSA-2025:10865","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10866","reference_id":"RHSA-2025:10866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10868","reference_id":"RHSA-2025:10868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13675","reference_id":"RHSA-2025:13675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13675"},{"reference_url":"https://usn.ubuntu.com/7667-1/","reference_id":"USN-7667-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7667-1/"},{"reference_url":"https://usn.ubuntu.com/7674-1/","reference_id":"USN-7674-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7674-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050106?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~6ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~6ea-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060944?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.31~10ea-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.31~10ea-1"}],"aliases":["CVE-2025-30761"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zkz6-9t74-5bb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39538?format=json","vulnerability_id":"VCID-zr4f-wpm3-f3an","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2583.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2583","reference_id":"","reference_type":"","scores":[{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66837","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66816","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66752","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66715","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790444","reference_id":"1790444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1790444"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/22","reference_id":"22","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/22"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/24","reference_id":"24","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://seclists.org/bugtraq/2020/Jan/24"},{"reference_url":"https://www.debian.org/security/2020/dsa-4605","reference_id":"dsa-4605","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://www.debian.org/security/2020/dsa-4605"},{"reference_url":"https://www.debian.org/security/2020/dsa-4621","reference_id":"dsa-4621","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://www.debian.org/security/2020/dsa-4621"},{"reference_url":"https://security.gentoo.org/glsa/202101-19","reference_id":"GLSA-202101-19","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://security.gentoo.org/glsa/202101-19"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html","reference_id":"msg00050.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html","reference_id":"msg00060.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0122","reference_id":"RHSA-2020:0122","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0128","reference_id":"RHSA-2020:0128","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0157","reference_id":"RHSA-2020:0157","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0196","reference_id":"RHSA-2020:0196","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0202","reference_id":"RHSA-2020:0202","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0231","reference_id":"RHSA-2020:0231","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0231"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0232","reference_id":"RHSA-2020:0232","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0465","reference_id":"RHSA-2020:0465","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0467","reference_id":"RHSA-2020:0467","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0468","reference_id":"RHSA-2020:0468","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0469","reference_id":"RHSA-2020:0469","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0470","reference_id":"RHSA-2020:0470","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0541","reference_id":"RHSA-2020:0541","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0632","reference_id":"RHSA-2020:0632","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0856","reference_id":"RHSA-2020:0856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0856"},{"reference_url":"https://usn.ubuntu.com/4257-1/","reference_id":"USN-4257-1","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:53Z/"}],"url":"https://usn.ubuntu.com/4257-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2020-2583"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zr4f-wpm3-f3an"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34353?format=json","vulnerability_id":"VCID-ztx2-xh6v-nke1","summary":"Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21277","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37445","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75412","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.7539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75338","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75382","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041479","reference_id":"2041479","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041479"},{"reference_url":"https://security.gentoo.org/glsa/202209-05","reference_id":"GLSA-202209-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0161","reference_id":"RHSA-2022:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0165","reference_id":"RHSA-2022:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0166","reference_id":"RHSA-2022:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0185","reference_id":"RHSA-2022:0185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0204","reference_id":"RHSA-2022:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0209","reference_id":"RHSA-2022:0209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0211","reference_id":"RHSA-2022:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0228","reference_id":"RHSA-2022:0228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0229","reference_id":"RHSA-2022:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0233","reference_id":"RHSA-2022:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0233"},{"reference_url":"https://usn.ubuntu.com/5313-1/","reference_id":"USN-5313-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5313-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037803?format=json","purl":"pkg:deb/debian/openjdk-11@11.0.16%2B8-1~deb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vj-5zz4-6fe7"},{"vulnerability":"VCID-13t7-vubq-8kae"},{"vulnerability":"VCID-2tju-1r8k-sbf9"},{"vulnerability":"VCID-3tav-ffar-hfhb"},{"vulnerability":"VCID-47ae-xdqr-6qgb"},{"vulnerability":"VCID-4snj-etwf-eqe8"},{"vulnerability":"VCID-5et1-ytak-xqh7"},{"vulnerability":"VCID-6196-gvhx-ruh8"},{"vulnerability":"VCID-76rb-sg3r-bqce"},{"vulnerability":"VCID-8cup-qnc8-wudx"},{"vulnerability":"VCID-8wud-7t2q-xfa3"},{"vulnerability":"VCID-9n5v-4daz-eyc2"},{"vulnerability":"VCID-9urr-3gt2-mfhe"},{"vulnerability":"VCID-9uzg-sja9-hkcy"},{"vulnerability":"VCID-a282-ksr4-j3cu"},{"vulnerability":"VCID-a3xk-3wya-s3gm"},{"vulnerability":"VCID-a59u-h67v-yygm"},{"vulnerability":"VCID-apsn-z1br-3bdy"},{"vulnerability":"VCID-b32x-4pu4-jkh4"},{"vulnerability":"VCID-duy9-6f1p-vqah"},{"vulnerability":"VCID-dwh6-xw5k-mqg8"},{"vulnerability":"VCID-dyg2-udwy-cud7"},{"vulnerability":"VCID-e6dm-6767-9kdk"},{"vulnerability":"VCID-fau4-ajny-nfbd"},{"vulnerability":"VCID-fhj9-p1gx-c7hp"},{"vulnerability":"VCID-fwk5-wqvn-4qaz"},{"vulnerability":"VCID-fwv1-sj5y-xygd"},{"vulnerability":"VCID-gjgy-dfq7-zfb2"},{"vulnerability":"VCID-h2w2-8e43-j3g6"},{"vulnerability":"VCID-h7n1-qfs3-v3fw"},{"vulnerability":"VCID-htat-fksw-c3gk"},{"vulnerability":"VCID-jm9f-9y4b-qye7"},{"vulnerability":"VCID-jw6x-cntu-nfht"},{"vulnerability":"VCID-jztz-7cuw-t7ep"},{"vulnerability":"VCID-kq78-adbv-67a7"},{"vulnerability":"VCID-mt9c-tby1-wqe9"},{"vulnerability":"VCID-n71d-tx76-vbbd"},{"vulnerability":"VCID-nr6u-aysf-7kgk"},{"vulnerability":"VCID-ntga-y6cv-a3df"},{"vulnerability":"VCID-nxx8-nehy-qyhg"},{"vulnerability":"VCID-p9na-7jta-9yg4"},{"vulnerability":"VCID-q5gr-6u92-6ybk"},{"vulnerability":"VCID-q9r9-wkqu-6bhu"},{"vulnerability":"VCID-rfs8-njaq-qkc8"},{"vulnerability":"VCID-rggy-f3va-mfay"},{"vulnerability":"VCID-t4r8-ujpb-5kdk"},{"vulnerability":"VCID-t5sp-ea5b-f7af"},{"vulnerability":"VCID-u81s-cs95-4yhx"},{"vulnerability":"VCID-um54-6ggz-gqf9"},{"vulnerability":"VCID-vbw8-4j9f-eya5"},{"vulnerability":"VCID-vpnc-yu7r-bqb6"},{"vulnerability":"VCID-wn4r-ugaa-5ydb"},{"vulnerability":"VCID-x4ms-sbj7-aufu"},{"vulnerability":"VCID-xk2v-7cgk-13ex"},{"vulnerability":"VCID-y8bc-k5qu-c7f5"},{"vulnerability":"VCID-z356-tw9t-q7bp"},{"vulnerability":"VCID-zdra-bzqn-4ug9"},{"vulnerability":"VCID-zgpr-3zft-zqgt"},{"vulnerability":"VCID-zkz6-9t74-5bb4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.16%252B8-1~deb10u1"}],"aliases":["CVE-2022-21277"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ztx2-xh6v-nke1"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-11@11.0.4%252B11-1~deb10u1"}